SlideShare a Scribd company logo
1 of 49
KEEPING	AMERICA	SAFE:	
TOWARD	MORE	SECURE	
NETWORKS	FOR	CRITICAL	
SECTORS	
	
Cambridge,	Massachusetts	
March	2017	
	
Joel	Brenner			
brennerj@mit.edu	
	
	
	
	
Report	on	a	Series	of	MIT	Workshops,	2015-2016	
With	Recommendations	for	the	New	Administration	
	
	
	
	
	
	
	
	
	
______	
	
	
MIT	Center	for	International	Studies		
https://cis.mit.edu		
	
MIT	Internet	Policy	Research	Initiative		
https://internetpolicy.mit.edu		
	
	
______
MIT	Center	for	International	Studies																			2																				MIT	Internet	Policy	Research	Initiative																		
	
	
	
	
Table	of	Contents	
	
Executive	Summary	and	Recommendations	 3	
A	History	of	Hesitancy	 3	
Background:	 17	
The	Persistent	Problem	 17	
Expanding	Operational	Risk	 18	
Why	Are	Systems	Insecure?	 20	
Coordinating	Research	Policy	 24	
The	Workshop	Plan	 25	
The	Sector-Specific	Workshops	 27	
1.	Electricity	Sector	Workshop	 27	
2.	Financial	Sector	Workshop	 33	
3.	Communications	Sector	Workshop	 40	
4.	Oil-and-Natural-Gas	Sector	Workshop	 45
MIT	Center	for	International	Studies																			3																				MIT	Internet	Policy	Research	Initiative																		
	
Executive	Summary	and	Recommendations	
A	History	of	Hesitancy	
	
The	digital	systems	that	control	critical	infrastructure	in	the	United	States	and	most	
other	countries	are	easily	penetrated	and	architecturally	weak,	and	we	have	known	it	for	a	
long	 time.	 Yet	 Presidential	 leadership	 on	 infrastructure	 security	 has	 been	 hesitant	 and	
chiefly	rhetorical,	while	system	operators	have	tended	to	focus	on	short-term	fixes	and	
tactical	 improvements.	 Much	 effort	 has	 been	 devoted	 to	 developing	 better	 security	
standards,1
	but	most	standards	are	merely	advisory.	Key	federal	departments,	notably	but	
not	exclusively	homeland	security,	defense,	and	energy	have	devoted	significant	effort	to	
improving	 infrastructure	 security.	 Examples	 would	 be	 too	 numerous	 to	 cite.	 But	 these	
efforts	have	not	altered	the	strategic	balance.	
	
Offense	 remains	 dominant.	 To	 break	 this	 cycle,	 the	 nation	 will	 require	 a	
coordinated,	multi-year	effort	to	address	deep	strategic	weaknesses	in	the	architecture	of	
critical	systems,	in	how	those	systems	are	operated,	and	in	the	devices	that	connect	to	
them.	 This	 effort	 must	 in	 part	 be	 technically	 directed,	 but	 it	 will	 also	 require	 a	 re-
evaluation	of	the	laws,	regulations,	and	policies	that	govern	our	networks.	The	challenges	
we	face	are	not	merely	technical.	They	are	also	economic,	managerial,	behavioral,	political,	
and	 legal.	 Indeed	 the	 technical	 challenges	 may	 be	 the	 easiest	 to	 address.	 For	 example,	
aligning	 economic,	 tax,	 and	 liability	 incentives	 with	 the	 goal	 of	 higher	 security	 is	 not	 a	
technical	 challenge.	 Re-aligning	 incentives	 would	 be	 a	 daunting	 task,	 but	 our	 critical	
infrastructure	cannot	be	made	reasonably	secure	unless	we	do	it.	
	
This	report	identifies	the	most	strategic	of	those	challenges	and	proposes	a	policy	
and	research	agenda	that	has	the	potential	to	achieve	significantly	higher	levels	of	security	
in	critical	networks	over	a	five-	to	ten-year	period.	But	the	nation	must	begin	now.	Our	
goal	is	action,	both	immediate	and	long-term.	
	
To	address	this	task,	CIS	and	IPRI	jointly	convened	a	series	of	workshops	focused	on	
four	critical	economic	sectors,	all	of	which	are	overwhelmingly	or	entirely	in	private	hands:	
electricity,	finance,	communications,	and	oil-and-natural	gas	(ONG).	We	did	not	set	out	to	
write	yet	another	description	of	the	threat	to	our	critical	networks.	In	the	wake	of	repeated,	
widely	reported	foreign	intrusions	into	our	power	grid	and	banking	system	and	the	recent	
Russian	interference	in	our	national	election,	the	threat	is	well	known.	Rather,	we	focused	
																																																								
1
	See,	e.g.,	National	Institute	for	Standards	and	Technology,	“NIST	Releases	Update	to	Cybersecurity	
Framework,”	 January	 10,	 2017,	 at	 https://www.nist.gov/news-events/news/2017/01/nist-releases-
update-cybersecurity-framework,	accessed	February	9,	2017.
MIT	Center	for	International	Studies																			4																				MIT	Internet	Policy	Research	Initiative																		
	
on	what	to	do	about	it.		
	
The	workshops	were	attended	by	experts2
	from	leading	enterprises	in	each	sector,	
by	academic	experts	in	relevant	fields,	and	by	a	few	government	officials.	We	expected	
commonalities	 across	 all	 four	 sectors,	 and	 we	 found	 many.	 Participants	 in	 each	 sector	
bemoaned	 the	 difficulty	 of	 quantifying	 network	 risk,	 for	 example;	 and	 each	 workshop	
expressed	 great	 interest	 in	 techniques	 of	 containing	 cascading	 failure.	 But	 we	 also	
encountered	differences	among	sectors	–	in	part	because	the	sectors	operate	in	different	
regulatory	frameworks,	and	in	part	because	two	of	these	sectors	–	electricity	and	oil-and-
natural-gas	(ONG)	–	are	heavily	dependent	on	industrial	operating	technology	(OT)	as	well	
as	information	technology	(IT).	Significant	differences	also	exist	within	sectors	as	well	as	
between	them	in	their	levels	of	investment	in	cybersecurity	and	ability	to	fend	off	attacks.	
We	have	preserved	the	essence	of	the	individual	workshops	in	summaries	at	the	back	of	
this	report.	
	
The	Recommendations	
	
This	 report	 makes	 both	 long-	 and	 short-term	 recommendations	 of	 broad	
applicability	to	critical	infrastructure	in	the	United	States	and,	excepting	certain	legal	and	
regulatory	 matters,	 to	 critical	 infrastructure	 globally.	 The	 report	 identifies	 eight	 strategic	
challenges	to	illuminate	our	predicament	and	guide	our	policy	and	research.	Under	each	
challenge,	it	makes	findings	that	emerged	from	the	workshops	and	recommendations	to	
address	them.	The	recommendations	cover	a	wide	range	of	issues,	from	the	organization	of	
cybersecurity	 in	 the	 Executive	 Office	 of	 the	 President	 to	 technical	 measures	 of	 network	
security	and	misaligned	regulatory	incentives.	Each	of	the	challenges	is	then	followed	by	a	
series	 of	 research	 questions	 whose	 answers	 could	 help	 meet	 that	 challenge.	 The	 report	
therefore	addresses	three	audiences:	government	officials,	public	and	private	institutions	
that	fund	research,	and	the	researchers	themselves.	By	changing	and	focusing	the	research	
environment,	 IPRI	 and	 CIS	 believe	 the	 nation	 could	 materially	 improve	 our	 long-term	
security	 environment.	 We	 emphasize	 the	 coordination	 of	 funding,	 however;	 we	 do	 not	
propose	budgetary	measures.	
	
																																																								
2
	Participants	were	free	to	use	any	information	received,	but	neither	the	identity	nor	the	affiliation	of	
any	 speaker	 or	 participant	 could	 be	 revealed.	 Industry	 participants	 came	 from	 ten	 private	 energy	
companies	 in	 the	 United	 States,	 Canada,	 France,	 and	 the	 United	 Kingdom,	 including	 two	 of	 the	 oil	
majors;	four	leading	international	banks,	a	major	data	processor	for	financial	institutions,	and	a	leading	
securities	 clearing	 organization;	 two	 tier-one	 communications	 providers;	 a	 leading	 computer	 chip	
manufacturer;	 a	 leading	 maker	 of	 commercial	 and	 consumer	 software;	 and	 representatives	 of	 the	
Government	of	Canada,	the	U.S.	departments	of	homeland	security	and	energy,	and	the	Office	of	the	
Governor	of	Massachusetts.	Participants	from	firms	and	governments	in	India	and	from	another	U.S.	
university	were	invited	but	did	not	attend.	The	views	expressed	in	this	report	do	not	necessarily	reflect	
those	of	individual	workshop	participants	or	of	their	enterprises	and	agencies.
MIT	Center	for	International	Studies																			5																				MIT	Internet	Policy	Research	Initiative																		
	
Some	of	these	research	questions	we	pose	are	broad	and	technical	(e.g.,	Can	cyber	
risk	be	measured?);	others	are	narrow	and	focus	on	non-technical	impediments	to	adopting	
technically	available	security	measures	(e.g.,	What	economic	or	other	factors	impede	the	
adoption	of	secure	connections	between	service	providers?).	Differences	in	generality	were	
unavoidable	 if	 we	 were	 to	 describe	 the	 full	 range	 of	 technical	 and	 policy	 questions	 that	
must	be	answered,	especially	because	many	of	the	impediments	are	legal,	economic,	and	
political	rather	than	technical.	Taken	together,	these	questions	should	form	the	basis	of	a	
focused,	 national	 agenda	 that	 must	 be	 adopted,	 coordinated,	 and	 funded	 if	 we	 are	 to	
escape	from	a	twenty-five-year	cycle	of	futile	tactical	measures	and	imprecise	aspirational	
statements	from	a	never-ending	series	of	governmental	and	private	groups.	
	
The	nation	can	no	longer	afford	a	pattern	of	uncoordinated	executive	action	and	
scattershot	 research.	 Total	 security	 is	 not	 achievable.	 But	 a	 materially	 improved	 security	
environment	 for	 the	 infrastructure	 on	 which	 virtually	 all	 economic	 and	 social	 activity	
depend	can	be	created	with	sufficient	resources	and	political	will.	Achieving	this	goal	will	
require	 a	 more	 determined	 and	 more	 directive	 approach	 from	 the	 highest	 levels	 of	
government	and	industry.	It	will	also	require	more	energetic	and	coordinated	steps	from	
the	President	than	any	of	his	predecessors	has	been	willing	to	take.
MIT	Center	for	International	Studies																			6																				MIT	Internet	Policy	Research	Initiative																		
	
FINDINGS	AND	RECOMMENDATIONS	
FIRST	CHALLENGE	
Improve	Coordination.	
Finding:	
	
Critical	 infrastructure	 defense	 is	 insufficiently	 coordinated	 across	 the	
government.	Changing	the	status	quo	will	require	a	more	directive	effort	
from	the	White	House.	
	
Recommendation:	
	
The	President	should	elevate	his	cybersecurity	advisor	to	the	position	of	
deputy	national	security	advisor	for	cybersecurity.	That	official	should	be	
directed	 and	 empowered	 to	 work	 with	 the	 Office	 of	 Management	 and	
Budget	 (OMB)	 to	 focus	 long-term	 policy	 across	 the	 government	 on	 the	
substantive	challenges	identified	below	and	to	produce	on	an	accelerated	
schedule	a	federal	research	agenda	and	budget	for	the	cybersecurity	of	
critical	 infrastructure	 focused	 on	 these	 same	 challenges.	 OMB	 should	
determine	that	funds	are	spent	accordingly.	
	
SECOND	CHALLENGE	
Measure	cyber	risk	and	infrastructure	fragility.	
Finding:	
	
	 Quantifying	risk	in	either	absolute	or	relative	terms	is	a	difficult	challenge	
that	 impedes	 cybersecurity	 investment	 in	 all	 sectors	 examined	 except	
certain	financial	institutions.	The	asserted	inability	to	measure	the	rate	of	
return	 on	 cybersecurity	 investment	 is	 a	 closely	 related	 problem3
	 that	
affects	overall	investment	levels	and	makes	it	difficult	to	target	investment.	
Fragility	of	systems	is	a	salient	aspect	of	risk	that	concerned	participants	in	
all	sectors.	Absent	assurances	of	confidentiality,	candid	participation	by	the	
private	sector	will	not	occur.	However,	the	public	should	be	informed	of	
the	general	state	of	security	of	critical	infrastructure.	
	 	
																																																								
3
	Most	participants	accepted	the	view	that	cyber	risk,	changes	in	cyber	risk	resulting	from	a	specific	
security	investment,	and	the	rate	of	return	on	that	kind	of	investment	could	not	be	measured.	For	the	
contrary	 view,	 see	 Douglas	 W.	 Hubbard	 and	 Richard	 Seiersen,	 How	 to	 Measure	 Anything	 in	
Cybersecurity	Risk	(New	York,	2016).
MIT	Center	for	International	Studies																			7																				MIT	Internet	Policy	Research	Initiative																		
	
Recommendation:	
	
The	President	should	direct	the	lead	departmental	secretary	to	convene	
on	an	accelerated	schedule	a	meeting	of	representatives	of	the	relevant	
national	 laboratories	 and	 other	 experts	 to	 assess	 impediments	 to	
measuring	cyber	risk	and	fragility	and	to	recommend	a	national	strategy	
to	meet	this	challenge.	The	meeting	should	be	closed	to	the	public	and	its	
proceedings,	though	not	the	strategy,	should	be	kept	confidential.	
	
Research	Questions:	
	
1. Can	cyber	risk	or	network	fragility	be	measured?	Can	changes	in	risk	as	the	result	
of	specific	security	investments	be	measured?	If	so,	why	are	enterprises	not	doing	
it?	
	
2. Would	the	answers	to	these	questions	produce	more	rational	decision-making	by	
enterprises?	If	not,	why	not?	
	
3. Can	 simulation-based	 modeling	 be	 used	 to	 create	 cybersecurity	 stress-tests	 for	
critical	sectors?	In	the	electricity	sector,	could	that	type	of	modeling	be	used	to	
test	 the	 ability	 to	 “cold	 start”	 electricity	 generation?	 Can	 the	 results	 of	 such	
modeling	 be	 protected	 from	 public	 disclosure?	 How,	 and	 at	 what	 level	 of	
generality,	should	the	public	be	informed	of	vulnerabilities	in	critical	systems?	
	
4. Should	the	answers	to	these	questions	have	regulatory	implications	for	some	or	all	
critical	sectors?	
	
5. Can	the	necessary	de-identified4
	data	be	obtained	to	support	research	into	these	
questions?	Would	legislation	be	appropriate	to	compel	the	production	of	that	de-
identified	data	in	the	interest	of	national	security	–	but	with	an	exemption	from	
disclosure	 and	 under	 a	 legal	 privilege	 that	 would	 prevent	 its	 use	 for	 any	 other	
purpose?5
	How	would	the	required	data	be	defined,	and	who	should	hold	it?	
	 	
																																																								
4
	De-identification	means	removing	identifying	aspects	of	data	so	that,	practically	speaking,	it	would	be	
difficult	and	expensive	to	re-associate	it	with	a	particular	person.	Perfect	anonymization	of	data	is	not	
possible	in	most	circumstances.	
5
	The	National	Infrastructure	Protection	Act,	codified	as	42	U.S.C.	§§	5195c	et	seq.,	does	not	clearly	
give	the	Department	of	Homeland	Security	power	to	require	production	of	specific	categories	of	data	
from	private	firms.	See	42	U.S.C.	§	5195c	(d)(2)(A)	and	(B).
MIT	Center	for	International	Studies																			8																				MIT	Internet	Policy	Research	Initiative																		
	
	
THIRD	CHALLENGE	
Review	laws	and	regulations	with	the	goals	of	reducing	risk	and	optimizing	security	
investment.	
	
Finding:	
	
Participants	from	all	sectors	overwhelmingly	believed	there	was	a	material	
disconnection	between	mandatory	compliance	regimes	and	improvements	
in	cybersecurity.	Most	participants	from	all	sectors	except	finance	believed	
that	federal	tax	and	regulatory	incentives	for	higher	levels	of	cybersecurity	
investment	 should	 be	 considered.	 Many	 participants	 from	 the	 electricity	
and	telecommunications	sectors	believed	that	regulations	either	impeded	
or	did	not	encourage	higher	levels	of	cybersecurity	investment.	
	
Recommendations:	
	
The	President	should	propose	legislation	at	the	earliest	opportunity	for	
the	more	favorable	tax	treatment	of	qualified	cybersecurity	investment	in	
critical	infrastructure	and,	potentially,	throughout	the	economy,	including	
investment	 necessary	 to	 convert	 to	 a	 more	 secure	 DNS	 and	 to	 more	
secure	 border	 gateway	 protocols.	 To	 qualify	 for	 favorable	 treatment,	
investments	 should	 be	 in	 products	 and	 services	 that	 are	 demonstrably	
compliant	with	the	framework	promulgated	by	the	National	Institute	for	
Standards	and	Technology	(NIST).6
	
	
The	 secretary	 of	 energy,	 state	 public	 utility	 commissioners,	 and	 the	
National	Association	of	Regulated	Utility	Commissioners	should	forthwith	
examine	the	effect	of	utility	regulation	on	cybersecurity	with	particular	
attention	 to	 (i)	 the	 effect	 of	 current	 regulations	 on	 cybersecurity	
investment	 and	 (ii)	 the	 usefulness	 of	 current	 compliance	 standards	 in	
achieving	higher	levels	of	security.	
																																																								
6
	 National	 Institute	 for	 Standards	 and	 Technology,	 “Framework	 for	 Improving	 Critical	 Infrastructure	
Cybersecurity,”	 version	 1.0,	 February	 12,	 2014,	 at	
https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-
021214.pdf,	 accessed	 February	 20,	 2017.	 For	 draft	 version	 1.1	 of	 the	 Framework,	 see	
https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-
021214.pdf,	accessed	February	20,	2017.
MIT	Center	for	International	Studies																			9																				MIT	Internet	Policy	Research	Initiative																		
	
Research	Questions:	
	
1. How	should	liability	rules	and	regulations	be	optimized	to	produce	more	secure	
behavior	 by	 vendors	 and	 by	 the	 owners	 and	 operators	 of	 infrastructure?	 A	
comparative	study	of	state	as	well	as	federal	regulatory	models	would	be	useful	in	
addressing	this	question.	
	
2. Can	 cybersecurity	 regulation	 be	 harmonized	 across	 government?	 Government	
regulates	 by	 sector.	 For	 example,	 the	 Federal	 Communications	 Commission	
regulates	telecommunications;	the	Treasury	Department,	the	Federal	Reserve,	and	
other	 agencies	 regulate	 banks;	 the	 Energy	 Department,	 the	 Environmental	
Protection	 Agency,	 and	 the	 states	 regulate	 energy,	 and	 so	 on.	 But	 as	 these	
“vertical”	 regulators	 have	 also	 begun	 to	 regulate	 cybersecurity,	 a	 complex	 of	
overlapping,	 expensive,	 and	 potentially	 inconsistent	 standards	 is	 emerging.	 Are	
these	regulations	driving	greater	security,	or	are	they	merely	more	elaborate	and	
expensive	compliance	regimes?	
	
3. The	 many	 competing	 compliance	 standards	 create	 confusion.	 Should	 the	
government	 make	 the	 NIST	 Framework,	 and	 only	 the	 NIST	 Framework,	 a	 single	
mandatory	 standard	 across	 government	 and	 for	 contractors	 dealing	 with	 the	
government?	
	
4. Could	 the	 financial	 impact	 on	 insurers	 and	 re-insurers	 of	 the	 damage	 resulting	
from	a	successful	attack	on	one	or	more	critical	sectors	be	absorbed	by	them?	If	
not,	what	law	and	policy	would	be	required	to	make	it	likely	that	such	losses	could	
be	absorbed?	
	
5. Can	the	necessary,	de-identified	data	be	obtained	to	support	research	into	these	
questions?	If	not,	would	legislation	be	appropriate	to	compel	the	production	of	
that	de-identified	data	in	any	sector	while	protecting	the	rights	of	the	enterprises	
that	would	produce	the	data?	How	would	the	required	data	be	defined?	
	
FOURTH	CHALLENGE	
Enable	critical	infrastructure	operators	to	quickly	identify	and	respond	to	
cyber	risk	arising	from	cross-sector	linkages	as	well	as	from	their	own	networks.	
	
Finding:	
	
All	sectors	depend	on	electricity,	and	the	financial	sector’s	global	platform	
supports	 transactions	 with	 energy	 and	 telecommunications.	 These	 and	
other	 linkages	 create	 possibilities	 for	 cascading	 failure	 that	 are	
insufficiently	understood	and	not	adequately	illuminated	by	sector-specific
MIT	Center	for	International	Studies																			10																				MIT	Internet	Policy	Research	Initiative																		
	
simulations	 and	 other	 testing.	 Participants	 from	 all	 sectors	 stated	
emphatically	 that	 cooperation	 on	 pooling	 proprietary	 data	 and	 candor	
regarding	the	results	of	testing	could	not	be	achieved	unless	parties	could	
be	assured	that	the	data	and	results	would	remain	confidential	and	could	
not	be	used	for	other	purposes.	
	
Recommendation:	
	
The	President	should	direct	the	lead	departmental	secretary	to	convene	
on	an	accelerated	schedule	a	meeting	of	representatives	of	the	nation’s	
leading	 industrial	 insurers	 and	 other	 experts	 to	 examine	 the	 steps	
necessary	to	enable	more	robust	cross-sector	simulations,	including	the	
sharing	 of	 data,	 and	 to	 make	 appropriate	 recommendations	 to	 the	
President.	The	meeting	should	be	closed	to	the	public	and	its	proceedings	
kept	confidential,	but	the	resulting	recommendations	should	be	public.	
	
Research	Questions:	
	
1. What	 steps	 would	 increase	 the	 likelihood	 of	 early	 detection	 of	 a	 slow-moving	
strategic	attack	on	a	critical	sector	or	across	critical	sectors?	How	will	detection	
techniques	 be	 affected	 by	 the	 anticipated	 move	 to	 IPv6?7
	
	
2. How	would	such	an	attack	affect	critical	backup	systems?	
	
3. Can	simulation-based	modeling	be	used	to	create	better	cross-sector	stress	tests?		
	
4. Can	 simulated	 cyber	 disasters	 help	 determine	 how	 communications	 should	 be	
prioritized	in	the	event	of	a	national	emergency?	
	
5. Can	 efforts	 to	 use	 big	 data	 and	 fast	 processing	 to	 quickly	 detect	 intrusions	 in	
critical	networks	be	accelerated?	
	
6. What,	if	anything,	prevents	the	effective	use	of	identity	management	tools	across	
the	full	range	of	steps	necessary	to	execute	a	successful	exploit	or	attack?	
	 	
																																																								
7
	IPv6	is	an	Internet	addressing	protocol	that	would	expand	the	number	of	IP	addresses	available	under	
the	current	protocol,	called	IPv4,	by	a	factor	of	7.9	x	1028
.	It	could	therefore	render	ineffective	current	
techniques	for	scanning	systems	for	malware	because	the	address	space	to	be	scanned	would	be	
exponentially	larger.
MIT	Center	for	International	Studies																			11																				MIT	Internet	Policy	Research	Initiative																		
	
FIFTH	CHALLENGE	
Reduce	component	complexity	and	the	vulnerabilities	inherent	in	them.	
	
Finding:	
	
Participants	from	the	electricity	and	energy	and	oil-and-natural	gas	(ONG)	
sectors	believed	that	unduly	complex,	and	insufficiently	secure,	hardware,	
software,	 and	 industrial	 controls	 were	 a	 significant	 source	 of	 cyber	
vulnerabilities	that	created	physical	danger	as	well	as	risk	to	information.	
Participants	from	the	ONG	sector	were	emphatic	on	this	point.	Both	energy	
sectors	are	highly	dependent	on	industrial	operating	technology.	This	is	a	
significant	 supply	 chain	 risk	 created	 by	 commercial,	 not	 technological,	
factors.	 Suppliers	 find	 it	 profitable	 to	 market	 cheap,	 general	 purpose	
hardware	 and	 software	 for	 multiple	 uses,	 regardless	 of	 differing	 security	
tolerations	in	different	sectors	and	uses.	
	
Recommendation:	
	
The	President	should	direct	the	lead	departmental	secretary	to	report	to	
him	on	an	accelerated	schedule	on	the	feasibility,	timeline,	and	expense	
of	supporting	and	otherwise	incentivizing	the	production	and	use	of	more	
secure	 and	 less	 complex	 hardware,	 software,	 and	 controls	 for	 use	 in	
critical	infrastructure.	
	
Research	Questions:	
	
1. Can	the	technical,	economic,	and	regulatory	obstacles	to	reducing	complexity	in	
both	information	technology	and	industrial	operating	technology	be	identified?	
	
	
2. Field	programmable	gate	arrays	(multipurpose	computer	chips)	are	cheap,	so	they	
are	used	for	many	purposes	including	commercial	routers	and	industrial	controls	
used	 in	 critical	 infrastructure	 operations,	 but	 their	 complexity	 and	 superfluous	
functionality	increase	risk.	The	same	may	be	said	of	general	purpose	processing	
units,	operating	systems,	and	software	systems.	
	
a. Can	standards	be	established	to	reduce	the	vulnerabilities	in	logic	processors	
and	the	software	and	firmware	that	control	them?	
	
b. Can	standards	be	established,	or	incentives	created,	to	phase	out	design	tools	
that	permit	hardware	and	software	designers	to	make	the	same	basic	errors	
repeatedly,	such	as	allowing	buffer	overflows?
MIT	Center	for	International	Studies																			12																				MIT	Internet	Policy	Research	Initiative																		
	
c. What	steps	would	be	necessary	to	establish	a	certification	system	for	hardware	
and	software,	possibly	modeled	on	the	Underwriters	Laboratory	for	electrical	
products?	
	
d. Can	 microchips	 be	 designed	 so	 that	 entire	 sectors	 of	 those	 chips	 can	 be	
cheaply,	 reliably,	 and	 verifiably	 disabled	 so	 that	 functionality	 matches	 task	
requirements?	
	
3. What	incentives	should	be	in	place	to	induce	controls	manufacturers	and	Internet	
service	providers	to	use	less	vulnerable	chips?	
	
4. Are	the	departments	of	defense,	energy,	and	homeland	security	optimizing	their	
role	in	creating	and	supporting	a	market	for	simpler	and	more	secure	commercial	
devices	 in	 critical	 infrastructure?	 For	 example,	 can	 these	 departments	 jointly	
establish	 metrics	 for	 complexity	 and	 standards	 for	 controls,	 and	 use	 their	
procurement	 decisions	 to	 favor	 less	 complex	 and	 more	 secure	 hardware	 and	
software?	
	
5. Can	simpler	firmware	and	operating	systems	be	cost-effectively	developed	and	
marketed	for	use	in	critical	infrastructure?	
	
	
Sixth	Challenge	
Address	fundamental	issues	of	system	architecture.	
Findings:	
1.	The	Internet	is	a	legacy	system	designed	for	non-commercial	uses	with	
little	or	no	need	for	security.	Security	has	chiefly	been	an	option	for	end	
points,	 which	 frequently	 ignore	 it	 in	 favor	 of	 speed-to-market	 and	 low	
costs.	 Hardware	 and	 software	 that	 run	 on	 the	 Internet	 display	 wide	
differences	in	security,	and	the	tools	for	creating	hardware	and	software	
enable	many	of	the	same	security	errors	to	be	repeated	over	many	years,	
without	liability.	
2.	 Security	 professionals	 from	 all	 sectors	 overwhelmingly	 believed	 that	
certain	aspects	of	their	systems	could	not	otherwise	be	made	reasonably	
secure	 unless	 isolated	 from	 public	 networks.	 There	 are	 significant	
differences	of	opinion	about	appropriate	degrees	of	isolation.
MIT	Center	for	International	Studies																			13																				MIT	Internet	Policy	Research	Initiative																		
	
Recommendations:	
1.		The	President	should	direct	the	secretaries	of	energy	and	homeland	
security:	
	
a. in	consultation	with	the	Federal	Energy	Regulatory	Commission	(FERC),	to	
explore	 the	 feasibility,	 expense,	 and	 timelines	 of	 isolating	 from	 public	
networks8
	 all	 controls	 and	 operations	 of	 activities	 within	 FERC’s	
jurisdiction,9
	 to	 define	 acceptable	 degrees	 of	 isolation,	 and	 to	 report	 to	
the	President	on	an	accelerated	schedule;	an	
	
b. in	coordination	with	the	FERC	and	the	North	American	Electric	Reliability	
Corporation	 (NERC),10
	 to	 convene	 at	 the	 earliest	 practical	 time	 a	
conference	 of	 state	 electricity	 regulators	 to	 explore	 the	 feasibility	 and	
expense	 of	 isolating	 key	 elements	 of	 electricity	 generation	 and	 delivery	
from	public	networks.	
	
2.	The	President	should	direct	the	lead	departmental	secretary	to	consult	
with	 key	 stakeholders,	 including	 vendors,	 users,	 the	 public,	 and	 the	
insurance	 industry,	 about	 the	 desirability	 and	 feasibility	 of	 (i)	
establishing	 legally	 binding	 standards	 of	 care	 in	 the	 manufacture	 of	
hardware	 and	 software	 for	 critical	 infrastructure,	 and	 (ii)	 the	
establishment	of	a	privately	owned	and	managed	accreditation	bureau	
for	such	hardware	and	software,	and	to	report	to	the	President	on	an	
accelerated	schedule.	
	
Research	Questions:	
1. Should	 some	 operations	 of	 some	 or	 all	 critical	 sectors	 be	 isolated	 from	 the	
Internet?	 If	 so,	 which	 ones?	 How	 should	 “isolation”	 be	 defined?	 What	 level	 of	
isolation	would	be	appropriate	for	particular	systems	in	critical	applications?	Who	
should	determine	that?	
	
																																																								
8
	This	is	not	a	recommendation	to	create	a	single	non-public	energy	network.	Isolation	from	public	
networks	does	not	imply	isolation	from	efficient,	digital	operating	systems	that	produce	real-time,	or	
near	real-time,	information	about	those	systems.	Non-public	information	and	operating	systems	based	
on	TCP/IP	protocols	are	available	or	can	be	created.		
9
	 FERC	 has	 jurisdiction	 over	 the	 interstate	 transmission	 of	 electric	 power.	 Power	 generation	 and	
delivery	are	regulated	by	the	states	and	territories.	
10
	NERC	is	composed	of	the	owners	and	operators	of	the	grid	and	has	been	named	by	FERC	as	the	
“Electric	 Reliability	 Organization.”	 It	 is	 charged	 by	 Congress	 to	 “establish	 and	 enforce	 reliability	
standards	for	the	bulk-power	system,”	subject	to	FERC’s	oversight.
MIT	Center	for	International	Studies																			14																				MIT	Internet	Policy	Research	Initiative																		
	
2. Can	block	chain	or	other	technology	be	used	to	verify	accounts	in	a	timely	fashion	
to	reduce	the	risk	of	corrupted	backup	systems	and	wiped	accounts?	
	
3. What	 changes	 to	 security	 architectures	 would	 let	 us	 more	 efficiently	 manage	
system	 accesses	 and	 identities	 for	 devices,	 people,	 applications,	 and	 data,	 both	
internally	and	externally?	
	
4. Can	a	system	be	designed	so	that	its	failure	would	be	immediately	transparent	to	
its	operator?	Can	the	state	of	the	system’s	algorithms	be	made	understandable	to	
humans?	Would	it	be	cost-effective	to	impose	audit	requirements	on	that	kind	of	
system?	 (E.g.,	 if	 a	 driverless	 car	 ran	 off	 a	 bridge,	 could	 its	 control	 algorithm	 be	
made	 to	 explain	 why	 it	 did	 that?)	 If	 so,	 why	 don’t	 we	 mandate	 that	 kind	 of	
auditability	in	critical	sectors?	
	
5. What	economic,	regulatory,	or	other	factors	impede	the	more	rapid	phasing	out	of	
legacy	 components	 of	 electronic	 systems	 in	 favor	 of	 components	 that	 are	 not	
merely	newer	but	are	demonstrably	more	secure?	
	
6. What	economic	or	other	factors	impede	the	adoption	in	the	private	sector	of	the	
existing	but	largely	unused	secure	domain	name	system	or	an	alternative	security	
architecture?	 What	 incentives	 could	 accelerate	 the	 adoption	 of	 a	 more	 secure	
domain	name	system?	
	
7. In	 the	 communications	 sector,	 what	 economic	 or	 other	 factors	 impede	 the	
adoption	 of	 secure	 border	 gateway	 protocols	 that	 would	 make	 it	 impossible,	 or	
substantially	 more	 difficult,	 to	 divert	 network	 traffic?	 What	 incentives	 could	
accelerate	the	adoption	of	that	type	of	control?	
	
8. Companies	have	differing	interests.	Academics	make	a	living	by	disagreeing	with	
one	another	and	often	prefer	the	notional	perfect	to	the	achievable	good.	Universal	
agreement	on	a	domain	name	system	and	border	gateway	controls	is	therefore	not	
achievable.	Is	there	a	point,	short	of	war,	when	the	Congress	should	make	these	
choices?	
	
9. The	 Internet	 of	 Things	 makes	 attack	 surface	 management	 geometrically	 more	
difficult.	 	What	 aspects	 of	 insecure	 devices	 matter	 most	 in	 this	 respect?	 Should	
enhanced	 security	 be	 applied	 at	 the	 device	 level	 or	 only	 at	 higher	 levels	 within	
networks?	
	
10. Would	 it	 be	 feasible	 and	 efficient	 in	 a	 virtual	 network	 to	 segregate	 or	 at	 least	
identify	all	executable	code,	thus	making	unauthorized	executables	more	readily	
discoverable?
MIT	Center	for	International	Studies																			15																				MIT	Internet	Policy	Research	Initiative																		
	
SEVENTH	CHALLENGE	
	
Formulate	an	effective	deterrence	strategy	for	the	nation.	
	
Findings:	
	
The	 cybersecurity	 postures	 and	 capabilities	 of	 the	 United	 States	 and	 its	
peer	or	near-peer	competitors	in	cyberspace	have	served	to	deter	outright	
attacks	 against	 one	 another’s	 critical	 infrastructure,	 but	 have	 been	
unsuccessful	 in	 deterring	 lower-level	 but	 increasingly	 harmful	 cyber	
operations	across	our	economy,	society,	and	political	system.	Hostile	acts	
are	systematically	carried	out	below	the	level	of	armed	conflict	that	have	
the	potential	to	gradually	reduce	this	nation’s	stature	and	security	and	its	
ability	to	lead	free	and	open	democracies	around	the	globe.	In	this	gray	
space	 between	 war	 and	 peace,	 the	 United	 States	 does	 not	 have	 an	
effective	deterrence	strategy	against	either	nation-states	or	transnational	
groups	 bent	 on	 terror	 or	 other	 forms	 of	 disruption	 of	 our	 critical	
infrastructure.	
	
	
Recommendation:	
	
The	President	should	direct	his	national	security	advisor	to	review	the	nation’s	
deterrence	 strategy.	 That	 strategy	 should	 include,	 but	 not	 be	 limited	 to,	 (i)	
hardening	 critical	 American	 systems	 and	 infrastructure;	 (ii)	 raising	 the	 price	
for	 attacking	 them;	 (iii)	 constructing	 a	 diplomatic	 strategy	 for	 achieving	
verifiable	 cybersecurity	 agreements	 with	 potential	 adversaries;	 and	 (iv)	
evaluating	 the	 nation’s	 ability	 in	 the	 long	 term	 to	 maintain	 offensive	
dominance	 in	 cyberspace	 and	 the	 stabilizing	 or	 destabilizing	 effect	 of	
attempting	to	do	so.	
	
	
Research	Questions:	
1. In	 view	 of	 the	 demonstrated	 ability	 of	 certain	 nation-states	 to	 exploit	 critical	
networks	for	economic,	political,	and	potentially	military	advantage,	would	a	more	
directive	policy	toward	hardening	critical	networks	be	justified?	Would	that	course	
of	 action	 be	 politically	 acceptable	 in	 the	 United	 States	 and	 among	 other	 nations	
involved	in	global	transactions	and	telecommunications?	
	
2. Cyber	network	operations	by	capable	nation-states	and	their	proxies	are	difficult	or	
impossible	 to	 prevent,	 yet	 we	 expect	 critical	 infrastructure	 operators	 to	 defend	
themselves	against	these	attacks.	Is	this	the	right	public	policy?	If	not,	what	policy	
should	replace	it?
MIT	Center	for	International	Studies																			16																				MIT	Internet	Policy	Research	Initiative																		
	
	
	
3. Will	the	pursuit	of	offensive	dominance	in	cyberspace	continue	to	be	feasible	in	the	
next	 five	 to	 ten	 years?	 Will	 its	 pursuit	 be	 inconsistent	 with	 order	 and	 stability	 in	
cyberspace,	as	it	proved	to	be	in	the	strategic	nuclear	relationship	with	the	Soviet	
Union?	What	are	the	implications	of	the	answers	to	these	questions	for	American	
diplomatic	strategy	in	cyberspace?	
	
Is	the	President	receiving	robust	counter-strike	options,	both	military	and	non-
military,	 for	 cyber	 intrusions,	 including	 those	 that	 do	 not	 rise	 to	 the	 level	 of	
armed	conflict	under	international	law?	
	
4. Is	 any	 department	 of	 government	 conducting	 realistic	 simulations	 and	 other	
exercises	to	explore	the	consequences	of	non-military	counter-strikes	in	response	to	
a	 cyberattack?	 Does	 the	 President’s	 understand	 and	 approve	 of	 the	 assumptions	
that	underlie	these	exercises?	
	
EIGHTH	CHALLENGE	
Accelerate	and	improve	the	training	of	cybersecurity	professionals.	
	
Findings:	
	
There	is	a	serious	dearth	of	cybersecurity	expertise	in	the	United	States,	
especially	 at	 advanced	 levels.	 The	 nation	 does	 not	 produce	 enough	
graduates	 with	 advanced	 cybersecurity	 skills	 or	 with	 skills	 in	 both	
cybersecurity	and	in	the	operation	of	industrial	operating	systems.	
	
	
Recommendation:	
The	 President	 should	 appoint	 a	 blue-ribbon	 commission	 on	 the	
feasibility	of	increasing	the	supply	of	highly	trained	computer	scientists	
and	 engineers	 and	 developing	 model	 curricula	 for	 training	 computer	
scientists	 and	 engineers	 in	 the	 defense	 of	 critical	 systems.	 	 The	
commission	should	report	to	the	President	within	180	days.
MIT	Center	for	International	Studies																			17																				MIT	Internet	Policy	Research	Initiative																		
	
	
This	is	a	time	for	action.	It	is	also	a	time	for	calm,	long-term	strategic	
thinking,	based	on	sound	research,	into	the	underlying	causes	of	cyber	
insecurity	and	how	to	address	them.	
	
Research	Questions:	
1. Adm.	Hyman	Rickover	created	a	rigorous	model	for	selecting	and	training	nuclear	
submariners.	 Should	 government	 or	 industry	 adopt	 his	 model	 for	 the	 cyber	
defense	of	critical	infrastructure?	
	
2. Can	 effective	 network	 defense	 skills	 be	 taught	 without	 also	 teaching	 high-level	
offensive	skills?	If	not,	given	the	risk	of	teaching	those	skills	to	a	wider	cadre,	who	
should	be	eligible	to	receive	that	instruction?	Should	qualified	trainers,	in	defined	
circumstances,	be	granted	liability	protection	for	teaching	offensive	tactics?	
	
3. Are	different	core	curricula	appropriate	to	train	people	to	operate	and	defend	the	
networks	of	different	critical	infrastructures?	If	so,	who	should	develop	them?	
	
4. Should	 people	 in	 cybersecurity	 disciplines	 be	 subject	 to	 specialized	 training	 and	
certifications,	as	in	other	professional	disciplines?	
	
	
	
	
	
Background:	
The	Persistent	Problem	
	
In	 the	 United	 States,	 Presidential	 Directives	 to	 address	 infrastructure	 risk	 have	
emerged	from	the	White	House	like	clockwork	for	more	than	twenty-five	years.		In	1990,	
President	George	H.W.	Bush	announced	to	the	country	what	intelligence	officials,	but	not	
many	 others,	 already	 understood:	 “Telecommunications	 and	 information	 processing	
systems	 are	 highly	 susceptible	 to	 interception,	 unauthorized	 electronic	 access,	 and	
related	 forms	 of	 technical	 exploitation,	 as	 well	 as	 other	 dimensions	 of	 the	 foreign	
intelligence	threat.	.	.	.	“	
	
In	 1998,	 as	 enterprises	 were	 beginning	 to	 shift	 both	 information	 systems	 and	
operations	to	the	Internet,	President	Clinton	warned	of	the	insecurities	created	by	cyber-
based	systems.	In	1998	he	directed	that	“no	later	than	five	years	from	today	the	United	
States	shall	have	achieved	and	shall	maintain	the	ability	to	protect	the	nation’s	critical	
infrastructures	from	intentional	acts	that	would	significantly	diminish”	our	security.		Five	
years	later	would	have	been	2003.
MIT	Center	for	International	Studies																			18																				MIT	Internet	Policy	Research	Initiative																		
	
	
In	 2003,	 President	 George	 W.	 Bush	 implicitly	 recognized	 that	 this	 goal	 had	 not	
been	met.	He	stated	that	his	cybersecurity	objectives	were	to	“[p]revent	cyber	attacks	
against	America’s	critical	infrastructure;	[r]educe	national	vulnerability	to	cyber	attacks;	
and	[m]inimize	damage	and	recovery	time	from	cyber	attacks	that	do	occur.”	Meanwhile,	
virtually	 all	 commercial	 and	 operational	 activity	 was	 migrating	 to	 the	 Internet,	 which	
remained	insecure.	
	
By	2009,	concerns	about	critical	infrastructure	had	become	acute.	President	
Obama	said:	
	
The	 architecture	 of	 the	 Nation’s	 digital	 infrastructure,	 based	
largely	on	the	Internet,	is	not	secure	or	resilient.		Without	major	
advances	in	the	security	of	these	systems	or	significant	change	in	
how	 they	 are	 constructed	 or	 operated,	 it	 is	 doubtful	 that	 the	
United	States	can	protect	itself	from	the	growing	threat	….	
	
	
By	 2013	 –	 fifteen	 years	 after	 President	 Clinton	 had	 said	 the	 country’s	 critical	
infrastructure	 should	 be	 secure	 from	 malicious	 disruption	 by	 2003	 --	 President	 Obama	
acknowledged	that	the	goal	had	not	been	met:	“The	cyber	threat	to	critical	infrastructure	
continues	to	grow	and	represents	one	of	the	most	serious	national	security	challenges	we	
must	confront.”	The	view	at	the	enterprise	level	is	much	the	same.	Trend	Micro,	a	leading	
Internet	security	firm,	reported	in	2015	that	critical	infrastructure	operators	throughout	
the	Western	hemisphere	“painted	a	picture	that	depicts	the	threat	[to	their	networks]	as	
being	severe,	while	some	perceived	the	future	of	securing	these	infrastructures	as	bleak.”	
	
	The	question	the	nation	faces	is	therefore	this:	Are	we	condemned	to	remain	in	
this	unstable	and	insecure	condition,	in	which	the	best	we	can	do	is	to	repeat	urgent	but	
futile	warnings	from	high	places	and,	at	the	operational	level,	merely	to	refine	our	tactics	
in	a	losing	game	of	Whac-A-Mole?	To	find	an	answer,	we	gathered	experts	from	industry,	
government,	 and	 academia,	 to	 imagine	 –	 in	 President	 Obama’s	 phrase	 –	 “a	 significant	
change	 in	 how	 [systems]	 are	 constructed	 or	 operated.”	 	This	 meant	 going	 beyond	 the	
intense	 and	 difficult	 day-to-day	 tactical	 challenges	 that	 critical	 sector	 operators	 face,	
important	as	they	are,	to	imagine	a	better	security	environment	in	five	to	ten	years	and	to	
understand	what	keeps	us	from	getting	there.	
Expanding	Operational	Risk	
For	the	owners	and	operators	of	critical	infrastructure,	the	prime	concern	is	risk	to	
continuity	of	operations	rather	than	theft	of	information,	though	that,	too,	is	a	serious	
risk.	An	intruder	who	can	steal	massive	amounts	of	data	from	a	system	remotely	can	also	
corrupt	 the	 information	 on	 the	 system,	 or	 wipe	 information	 from	 it,	 or	 shut	 it	 down.
MIT	Center	for	International	Studies																			19																				MIT	Internet	Policy	Research	Initiative																		
	
Information	 technology	 and	 industrial	 operating	 technology	 have	 largely	 converged.	 A	
decade	ago,	researchers	at	the	Idaho	National	Laboratory	proved	they	could	physically	
destroy	 a	 diesel-electric	 generator	 using	 only	 a	 keyboard	 and	 a	 mouse.11
	 Real-world	
examples	soon	followed.		
	
In	2010,	the	centrifuges	used	to	enrich	uranium	gas	at	Iran’s	Natanz	nuclear	facility	
started	failing	rapidly.	The	Iranians	were	baffled	–	until	researchers	in	Germany	diagnosed	
the	Stuxnet	virus,	now	widely	attributed	to	the	intelligence	services	of	the	United	States	
and	Israel.12
	In	2012,	cyber	attacks	from	Iran	wiped	all	information	from	thirty	thousand	
computers	 at	 the	 world’s	 largest	 oil	 refiner,	 Saudi	 Aramco.13
	 In	 2014,	 an	 unidentified	
intruder	used	a	spear-phishing	ruse	to	gain	access	to	the	network	of	a	German	steel	mill,	
then	 caused	 multiple	 components	 of	 the	 industrial	 control	 system	 to	 fail,	 resulting	 in	
massive	physical	damage.14
	Meanwhile,	starting	in	2011,	a	Russian	operation	known	as	
“Dragonfly/Energetic	 Bear”	 began	 targeting	 North	 American	 aviation	 companies	 before	
shifting	to	U.S.	and	European	energy	firms.	Its	targets	included	“energy	grid	operators,	
major	 electricity	 generation	 firms,	 petroleum	 pipeline	 operators,	 and	 Energy	 industry	
industrial	control	system	(ICS)	equipment	manufacturers.	Most	of	the	victims	were	in	the	
United	 States,	 Spain,	 France,	 Italy,	 Germany,	 Turkey,	 and	 Poland.”15
	 There	 were	 no	
reports	of	damage	from	these	penetrations;	they	appeared	to	be	reconnoitering	exercises	
that	could	facilitate	damaging	attacks	on	the	systems	later,	if	the	intruder	chose	to	attack.	
In	2015	the	prospect	that	an	attacker	might	launch	a	damaging	attack	on	an	adversary’s	
energy	 grid	 became	 reality	 when	 portions	 of	 Ukraine’s	 power	 grid	 were	 disabled	 for	
several	hours	in	a	coordinated	attack	on	three	energy	firms.	This	was	the	first	publicly	
acknowledged	 attack	 on	 a	 power	 grid.	 The	 Ukraine	 government	 immediately	 blamed	
Russia.	The	attackers	employed	a	range	of	sophisticated	tools,	but	in	the	view	of	several	
analysts,	“the	strongest	capability	of	the	attackers	was	not	in	their	choice	of	tools	or	in	
their	 expertise,	 but	 in	 their	 capability	 to	 perform	 long-term	 reconnaissance	 operations	
required	 to	 learn	 the	 environment	 and	 execute	 a	 highly	 synchronized,	 multistage,	
multisite	attack.”16
	
																																																								
11
	 “The	 experiment	 used	 a	 computer	 program	 to	 rapidly	 open	 and	 close	 a	diesel	 generator's	 circuit	
breakers	out	of	phase	from	the	rest	of	the	grid	and	cause	it	to	explode.”	Wikipedia,	“Aurora	Generator	
Test,”	at	https://en.wikipedia.org/wiki/Aurora_Generator_Test,	accessed	January	6,	2017.	
12
	Wikipedia,	“Stuxnet,”	at	https://en.wikipedia.org/wiki/Stuxnet,	accessed	November	16,	2016.	
13
	Nicole	Perlroth,	“In	Cyberattack	on	Saudi	Firm,	U.S.	Sees	Iran	Firing	Back,”	New	York	Times,	October	
23,	 2012,	 at	 http://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-
disquiets-us.html,	accessed	December	23,	2016.
14
	R.M.	Lee	et	al.,	“German	Steel	Mill	Attack,”	SANS	Institute,	ICS	Defense	Use	Case,	December	30,	
2014,	 at	 https://ics.sans.org/media/ICS-CPPE-case-Study-2-German-Steelworks_Facility.pdf,	 accessed	
December	23,	2016.	
15
June	30,	2014,	at		https://www.symantec.com/connect/blogs/dragonfly-western-energy-companies-
under-sabotage-threat,	accessed	December	6,	2016.	
16
	Lee	et	al.,	“Analysis	of	the	Cyberattck	on	the	Ukrainian	Power	Grid,”	SANS	Institute,	ICS	Defense	Use	
Case,	 March	 18,	 2016,	 at	 http://www.nerc.com/pa/CI/ESISAC/Documents/E-
ISAC_SANS_Ukraine_DUC_18Mar2016.pdf,	accessed	December	23,	2016.
MIT	Center	for	International	Studies																			20																				MIT	Internet	Policy	Research	Initiative																		
	
	
This	 is	 the	 offense-dominant	 environment	 that	 critical	 infrastructure	 operators	
now	 live	 in.	 Network	 defense	 has	 certainly	 gotten	 better	 in	 the	 last	 fifteen	 years	 in	
absolute	 terms,	 but	 so	 has	 the	 offense.	 Relative	 to	 the	 increased	 resources	 and	
sophistication	 of	 criminal	 and	 nation-state	 attackers,	 it	 is	 doubtful	 the	 defense	 has	
improved	at	all.	Attacks	are	still	easy	and	cheap	to	launch	and	difficult	and	expensive	to	
defend	against.	
	
The	 offense	 continues	 to	 enjoy	 inherent	 advantages	 owing	 to	 human	 fallibility,	
architectural	 flaws	 in	 the	 Internet	 and	 the	 devices	 connected	 to	 it,	 massive	 data	
aggregation,	and	pervasive	interconnectivity.	And	the	attacker	must	succeed	only	once,	
while	the	defense	must	succeed	thousands	or	millions	of	times.	Connecting	geographically	
dispersed	 operating	 equipment	 to	 the	 Internet	 has	 brought	 undoubted	 efficiencies	 to	
electricity	 generators	 and	 other	 industries,	 but	 it	 has	 also	 created	 dangerous	
vulnerabilities	 in	 the	 systems	 that	 keep	 the	 lights	 on	 and	 power	 the	 economy.	 In	 late	
2016,	 the	 recently	 retired	 chief	 security	 officer	 of	 AT&T	 said	 it	 was	 “inevitable	 that	
significant,	large-scale	cyber	attacks	will	be	launched	against	our	critical	infrastructure	[in	
the	coming	four	years].	These	attacks	will	shift	from	the	theft	of	intellectual	property	to	
destructive	attacks	aimed	at	disrupting	our	ability	to	live	as	free	American	citizens.	I	do	
not	know	of	a	single	cyber	security	expert	in	our	country	who	would	disagree	with	this	
view.”17
	We	concur.	
	 	 	 Why	Are	Systems	Insecure?	
When	the	Internet	was	being	designed	in	the	early	1970s,	it	was	not	initially	clear	
what	 the	 important	 security	 issues	 were.	 Its	 initial	 purposes	 were	 to	 assure	
communications	in	the	event	of	a	nuclear	attack	through	packet-switched	routing,	and	
then	 to	 serve	 as	 the	 basis	 for	 collaboration	 among	 geographically	 dispersed	 scientists	
working	for	the	Department	of	Defense.	The	relatively	few	people	having	access	to	the	
original	network	were	a	trusted	group	for	whom	security	was	not	an	issue.	Insofar	as	the	
network’s	 sponsors	 in	 the	 Department	 of	 Defense	 and	 the	 intelligence	 community	
thought	 about	 security,	 they	 preferred	 that	 security	 challenges	 be	 pushed	 onto	 the	
attached	 end-nodes,	 without	 appreciating	 the	 difficulty	 of	 doing	 so.	 The	 Internet’s	
designers	 understood	 that	 many	 security	 problems	 would	 best	 be	 addressed	 through	
encryption,	but	encryption	was	not	a	commercially	practical	technology	at	the	time	for	
reasons	 of	 performance	 and	 lack	 of	 open	 standards.	 At	 the	 time,	 encryption	 was	 also	
regulated	 as	 a	 munition	 for	 export	 purposes.	 These	 considerations,	 together	 with	 the	
imperative	to	get	the	Internet	to	work	at	all,	led	to	several	classes	of	security	problems.	In	
particular:	
																																																								
17
	Edward	Amoroso,	“An	Open	Letter	to	the	President-Elect	on	Cyber	Security,”	LinkedIn,	November	
25,	 2016,	 at	 https://www.linkedin.com/pulse/open-letter-president-elect-cyber-security-edward-
amoroso,	accessed	December	10,	2016.
MIT	Center	for	International	Studies																			21																				MIT	Internet	Policy	Research	Initiative																		
	
	
1. Several	of	the	core	control	protocols	and	supporting	services	of	the	Internet	were	
designed	without	an	approach	to	security,	and	adding	security	after	the	fact	has	
proved	more	difficult	than	anticipated.	These	protocols	include	the	global,	inter-
domain	 routing	 protocol	 (Border	 Gateway	 Protocol	 or	 BGP),	 the	 Domain	 Name	
System	 (DNS),18
	 and	 the	 Certificate	 Authority	 system.	 In	 all	 these	 cases,	 secure	
alternatives	have	been	proposed	but	have	not	been	taken	up	in	the	marketplace.	
What	the	original	designers	thought	would	be	a	technical	challenge	has	turned	out	
in	 all	 cases	 to	 be	 a	 challenge	 created	 by	 misaligned	 economic	 incentives,	 poor	
coordination	 and	 leadership,	 a	 lack	 of	 global	 trust	 among	 stakeholders,	 and	
disagreements	 about	 what	 the	 security	 problems	 are.	
	
2. Strictly	speaking,	the	Internet	is	simply	the	network	that	connects	end-points	using	
a	 technical	 protocol	 called	 “TCP/IP.”19
	 It	 was	 never	 meant	 to	 police	 itself	 for	
criminal	or	offensive	behavior.	To	a	significant	degree,	therefore,	the	Internet	is	
doing	what	it	was	designed	to	do:	that	is,	to	connect	end-points.	Many	(perhaps	
most)	 of	 the	 vulnerabilities	 in	 our	 systems	 occur	 at	 other	 levels	 –	 in	 hardware	
designed	 with	 little	 or	 no	 consideration	 for	 basic	 security,	 for	 example;20
	 in	
carelessly	 written	 software;21
	 and	 in	 applications	 created	 for	 quick	 market	
penetration	 that	 are	 unable	 to	 meet	 reasonable	 security	 requirements.22
	 In	 the	
early	 days	 of	 the	 Internet’s	 development,	 the	 designers	 paid	 relatively	 little	
attention	to	the	challenge	of	developing	secure	applications,	since	in	their	view	
they	had	no	control	over	what	application	designers	could	do.	Most	application	
designers	 today	 are	 motivated	 by	 features,	 time	 to	 market,	 and	 return	 on	
investment.	These	priorities	align	poorly	with	security.	This	set	of	actors	is	highly	
diverse,	unregulated,	transnational,	and	sometimes	hard	to	find,	and	it	is	not	clear	
what	approach	could	be	used	to	nudge	them	to	attend	more	to	security.	
																																																								
18
	 “Domain	 Name	 System,”	 Wikipedia,	 at	 https://en.wikipedia.org/wiki/Domain_Name_System,	
accessed	December	12,	2016.		
19
	 For	 definitions	 of	 the	 Internet	 and	 TCP/IP	 protocols,	 see	 respectively	 Wikipedia	 at	 “Internet,”	
https://en.wikipedia.org/wiki/Internet,	 and	 “Internet	 Protocol	 Suite,”	
https://en.wikipedia.org/wiki/Internet_protocol_suite,	both	accessed	January	7,	2017.	
20
	For	the	IoT	attack	on	an	important	Internet	company,	see	Schneier	on	Security	blog,	“Lessons	from	
the	Dynamics’s	DDoS	Attack,”		
https://www.schneier.com/blog/archives/2016/11/lessons_from_th_5.html;	 James	 Scott	 and	 Drew	
Spaniel,	Rise	 of	 the	 Machines:	 The	Dynamics’s	 Attack	 Was	 Just	 a	 Practice	 Run,	December	 2016,	
Institute	 for	 Critical	 Infrastructure	 Technology	 report,	 at	http://icitech.org/wp-
content/uploads/2016/12/ICIT-Brief-Rise-of-the-Machines.pdf,	accessed	January	8,	2017.	
21
	See,	e.g.,	Wikipedia,	“Buffer	Overflows,”	at	https://en.wikipedia.org/wiki/Buffer_overflow,	accessed	
January	3,	2017.	Buffer	overflows	have	been	known	to	be	a	security	vulnerability	for	years.	
22
	 See,	 e.g.,	 Lucian	 Constantin,	 “App	 Developers	 Not	 Ready	 for	 Stricter	 IoS	 Security	 Requirements,”	
Computerworld,	 December	 6,	 2016,	 at	 www.computerworld.com/article/3147373/security/app-
developers-not-ready-for-stricter-ios-security-requirements.html,	accessed	December	7,	2016.
MIT	Center	for	International	Studies																			22																				MIT	Internet	Policy	Research	Initiative																		
	
	
3. There	is	no	agreement	today	on	who,	if	anyone,	should	be	responsible	for	making	
the	Internet	ecosystem	more	secure.	For	example,	it	can	be	extremely	difficult,	
even	impossible,	to	be	certain	who	you	are	communicating	with	on	the	Internet.	
Identities	can	be	easily	spoofed	and	websites	counterfeited,	enabling	fraud.	But	
which	actors	in	the	Internet	ecosystem	should	undertake	to	fix	this?	Should	the	
packet-forwarding	layer	of	the	Internet	attempt	to	impose	a	single,	global	identity	
scheme	 that	 applies	 to	 all	 applications?	 Doing	 so	 would	 raise	 yet	 again	 the	
question	of	global	trust	and	coordination.	It	would	make	anonymous	action	very	
difficult.	That	would	reduce	crime,	but	it	would	also	enhance	surveillance	powers	
and	thereby	threaten	privacy.	Should	the	large	and	uncoordinated	community	of	
application	designers	be	told	that	identity	assurance	is	their	problem?	In	fact,	the	
solution	probably	requires	support	at	all	layers.	But	there	is	no	institutional	forum	
in	 which	 an	 allocation	 of	 responsibility	 can	 be	 resolved.	
	
4. Data	files,	which	are	passive,	and	executable	files,	which	perform	operations	on	
data,	cannot	be	distinguished	as	they	are	transmitted	across	the	Internet.	But	this	
approach	 left	 the	 discrimination	 between	 data	 and	 executable	 files	 to	 the	
application	designers	in	the	end-nodes,	who	were	often	indifferent	to	the	issue.	As	
a	result,	malicious	executables	are	easily	disguised	among	large	quantities	of	data.	
They	 are	 easy	 to	 insert	 and	 extremely	 difficult	 to	 find	 in	 a	 large	 database	 or	
system.	This	problem	became	much	more	difficult	once	data	files	(e.g.,	a	Word	
file)	were	designed	to	embed	executable	code	(e.g.,	macros).	
	
After	Congress	made	the	Internet	generally	available	for	commercial	use	in	1992,	
the	 network	 became	 the	 backbone	 of	 our	 entire	 system	 of	 economic	 and	 social	
communication,	 and	 increasingly	 of	 our	 physical	 operations,	 so	 these	 inherent	
weaknesses	assumed	enormous	significance.	As	Richard	Danzig	has	noted,	“Cyber	systems	
create	serious	security	problems	because	they	concentrate	information	and	control	and	
because	 the	 complexity,	 communicative	 power	 and	 interactive	 capabilities	 that	 enable	
them	 unavoidably	 create	 vulnerabilities.”23
	 Putting	 massive	 amounts	 of	 information	 in	
one	 place,	 which	 is	 highly	 efficient,	 also	 facilitates	 massively	 efficient	 theft.	 And	
connecting	 almost	 everything	 to	 almost	 everything	 else,	 which	 is	 also	 efficient,	 means	
that	a	vulnerability	in	any	part	of	the	interconnected	system	is	a	vulnerability	in	every	part	
of	it.	These	factors,	together	with	the	difficulty	of	tracing	and	attributing	attacks,	make	
the	Internet	a	prime	environment	for	criminals.	
																																																								
23
	 Richard	 Danzig,	 “Surviving	 on	 a	 Diet	 of	 Poisoned	 Fruit:	 Reducing	 the	 National	 Security	 Risks	 of	
America’s	 Cyber	 Dependencies,”	 Center	 for	 a	 New	 American	 Security	 (July	 2014),	 p.	 9,	 at	
https://www.cnas.org/publications/reports/surviving-on-a-diet-of-poisoned-fruit-reducing-the-
national-security-risks-of-americas-cyber-dependencies,	accessed	December	24,	2016.
MIT	Center	for	International	Studies																			23																				MIT	Internet	Policy	Research	Initiative																		
	
It	is	a	serious	error	to	assume	that	cybersecurity	is	entirely	a	matter	of	technical	
specifications	and	system	design.	Poor	business	management,	lack	of	clear	responsibility	
within	 organizations,	 and	 bad	 user	 behavior	 would	 continue	 to	 create	 significant	
vulnerabilities	even	if	the	technical	issues	could	suddenly	be	fixed.	Last	year,	when	for	the	
first	 time	 the	 Bank	 of	 England	 included	 cybersecurity	 as	 a	 major	 risk	 factor	 for	 the	
financial	stability	of	the	United	Kingdom,	its	number	one	finding	was,	“Overemphasis	on	
technological	 (as	 opposed	 to	 management,	 behavioural	 and	 cultural)	 aspects	 weakens	
cyber	defensive	capabilities.”24	
We	concur.	
A	common	human	error	enabling	fraud	is	susceptibility	to	an	online	scam	known	
as	phishing.	Phishing	involves	sending	a	mass	email	that	appears	to	come	from	a	trusted	
source	such	as	a	bank	or	a	well-known	company,	but	does	not.	A	recipient	(the	“phish”)	
who	opens	the	email	and	clicks	on	the	attachment	unwittingly	downloads	malware.	The	
purpose	of	the	malware	varies.	It	may	steal	information	such	as	passwords	or	credentials,	
or	it	may	enlist	the	recipient’s	machine	in	a	campaign	to	advertise	pornography,	drugs,	
etc.	 Phishing	 campaigns	 are	 nearly	 cost-free	 to	 conduct	 and	 are	 highly	 successful.	
According	to	Verizon,	thirty	percent	of	recipients	open	phishing	emails,	and	about	a	third	
of	 them	 click	 on	 the	 attachment.	 “The	 median	 time	 for	 the	 first	 user	 of	 a	 phishing	
campaign	to	open	the	malicious	email	[was]	1	minute,	40	seconds.	The	median	time	to	
the	first	click	on	the	attachment	was	3	minutes,	45	seconds	….”25
	
Spear	phishing	is	a	socially	engineered	fraud	aimed	at	a	specific	person,	often	a	
corporate	or	government	official.	This	is	a	favorite	tactic	of	sophisticated	criminal	gangs	
and	intelligence	services,	which	can	craft	an	email	that	appears	to	come	from	a	trusted	
person	on	a	topic	that	the	recipient	is	known	to	be	interested	in.	Sometimes	the	malware	
is	automatically	downloaded	merely	by	opening	the	email.	In	a	recent	survey	by	Trend	
Micro,	“spear-phishing	tactics	were	cited	by	all	responding	members	as	the	single	biggest	
attack	 method	 they	 had	 to	 defend	 against,	 with	 the	 exploitation	 of	 unpatched	 vendor	
software	 vulnerabilities	 being	 a	 distant	 second.”	 Whether	 an	 effective	 technological	
defense	to	this	vulnerability	can	be	deployed	remains	to	be	seen.		
	
Weaknesses	 in	 the	 email	 system	 also	 contribute	 to	 identity	 spoofing.	 The	 basic	
design	of	email	is	older	than	the	Internet;	it	existed	in	the	late	1960s	in	an	earlier	internal	
Defense	Department	network	called	ARPAnet.	There	seemed	to	be	little	need	in	those	
days	to	build	an	authenticated	identity	system	to	validate	the	sender	of	an	email	on	a	
closed	system	involving	trusted	parties.	Since	that	time,	there	have	been	proposals	put	
forward	to	secure	email	by	having	the	sender	sign	the	mail	in	a	trustworthy	manner,	but	
those	 proposals	 achieved	 little	 market	 traction	 owing	 to	 lack	 of	 market	 demand,	
																																																								
24
	 Bank	 of	 England,	 “Financial	 Stability	 Report,”	 July	 2015,	 Table	 A.10,	 p.	 32,	 at	
http://www.bankofengland.co.uk/publications/Documents/fsr/2015/fsrfull1507.pdf,	 accessed	 January	
6,	2017.	
25
	 Verizon,	 “2016	 Data	 Breach	 Investigations	 Report,”	 p.	 18,	 available	 at	
http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/,	accessed	December	24,	2016.
MIT	Center	for	International	Studies																			24																				MIT	Internet	Policy	Research	Initiative																		
	
engineering	complexity,	development	costs,	disagreements	about	the	correct	approach,	
the	 lack	 of	 an	 institution	 that	 could	 exercise	 acceptable	 global	 leadership,	 and	 so	 on.	
There	would	also	be	little	if	any	market	advantage	to	incurring	these	costs	if	others	failed	
to	follow.	These	issues	are	not	technical.	
The	vulnerabilities	at	all	levels	of	the	cyber	environment	have	been	well	known	for	
years,	yet	many	firms	fail	to	take	basic	security	precautions.	And	it	is	still	the	case	that	a	
large	majority	of	intrusions	are	discovered	by	law	enforcement	and	other	third	parties	
and	not	by	the	enterprise	that	owns	the	network.26
	Even	among	owners	and	operators	of	
critical	infrastructure,	decisions	to	expose	their	operations	to	these	vulnerabilities	have	
repeatedly	 been	 made	 with	 little	 or	 no	 regard	 for	 the	 risks	 thus	 imposed	 on	 the	
enterprise,	let	alone	the	risks	imposed	across	the	entire	economy.	Enterprises	that	expose	
their	operations	to	the	Internet	must	accept	Internet	services	as	they	find	them,	replete	
with	vulnerabilities,	and	protect	themselves	accordingly.	Insofar	as	those	enterprises	are	
regulated,	 the	 cost	 of	 doing	 so	 should	 be	 reflected	 in	 the	 rates	 they	 are	 permitted	 to	
charge.	
In	short,	profound	network	insecurity	has	persisted	for	twenty-five	years	for	many	
reasons.	 A	 problem	 this	 enduring	 in	 so	 fundamental	 an	 area	 demands	 concerted	
attention.	It	also	calls	for	concentrating	resources	devoted	to	research	and	development	
efforts	(R&D)	into	technologies	and	policies	to	make	attacks	more	difficult	and	expensive	
to	launch	and	less	difficult	and	expensive	to	combat.	
Coordinating	Research	Policy	
There	 has	 been	 no	 shortage	 in	 recent	 years	 of	 federal	 pleas	 for	 research	 into	
critical	 infrastructure	 cybersecurity,	 but	 they	 have	 tended	 to	 remain	 general	 and	
hortatory.	In	2009,	for	example,	the	Department	of	Homeland	Security	(DHS)	published	“A	
Roadmap	for	Cybersecurity	Research”	that	identified	an	important	problem	set	but	did	
not	 develop	 a	 research	 agenda	 to	 deal	 with	 it.	 In	 2011,	 the	 National	 Science	 and	
Technology	Council	(NSTC)	articulated	the	need	for	federal	spending	in	basic	cybersecurity	
research	but	was	content	to	describe	challenge	areas	(e.g.,	mobile	security,	creation	of	
trusted	spaces,	etc.)	rather	than	specific	areas	for	research.	
In	 2013	 a	 presidential	 policy	 directive	 emphasized	 that	 research	 was	 a	 critical	
aspect	of	achieving	critical	infrastructure	security	and	resilience27
	but	was	not	specific.	In	
																																																								
26
	Verizon,	2016	DBIR,	p.	11,	fig.	9.	
27
	Resilience	is	the	ability	to	operate	at	an	acceptable,	if	suboptimal,	level	of	performance	in	the	face	of	
attack	or	failure.	For	a	thoughtful	exploration	of	this	concept,	see	Harriet	Goldman,	“Building	Secure,	
Resilient	 Architectures	 for	 Cyber	 Mission	 Assurance,”	 Case	 10-3301,	 MITRE	 Corp.,	 2010,	 at	
https://pdfs.semanticscholar.org/911a/9c301359a0bcbdc3e49b2f7a04cf7eef14b2.pdf,	 accessed	
January	5,	2017.
MIT	Center	for	International	Studies																			25																				MIT	Internet	Policy	Research	Initiative																		
	
June	 2014,	 a	 subcommittee	 of	 the	 NSTC	 issued	 a	 cogent	 statement	 of	 federal	
cybersecurity	research	objectives,	but	did	not	identify	a	path	to	get	there.	Last	year	DHS	
brought	additional	attention	to	the	challenge	with	its	R&D	plan	for	research	in	this	area,	
but	the	plan	did	not	go	beyond	a	general	statement	of	objectives.	Reports	and	directives	
from	 high	 levels	 of	 government	 are	 inevitably	 general,	 but	 lack	 of	 follow-through	 and	
inattention	to	detail	are	not	inevitable.	At	the	agency	level,	specific	but	uncoordinated	
research	projects	are	underway	to	tackle	technical	cybersecurity	problems.	For	example,	
at	 the	 Defense	 Advanced	 Research	 Project	 Agency	 (DARPA)	 a	 project	 on	 Organically	
Assured	and	Survivable	Information	Systems	(OASIS)	focuses	on	increasing	fault	tolerance	
in	 systems	 and	 networks.	 But	 these	 programs	 are	 not	 coordinated,	 and	 many	 of	 the	
general	 problems	 described	 in	 high-level	 government	 documents	 remain	 insufficiently	
addressed,	if	addressed	at	all.	
Against	 this	 background,	 the	 nation	 must	 devote	 substantial	 coordinated	
resources	(1)	to	identify	the	most	salient	risks	to	critical	infrastructure	networks,	and	(2)	
to	describe	specific	cybersecurity	objectives	that	could	reduce	those	risks	and	that	could	
be	broken	into	manageable	research	projects.	This	is	what	IPRI	and	CIS	have	sought	to	do.	
	
The	Workshop	Plan	
	
IPRI	and	CIS	convened	four	sector-specific	workshops	to	study	the	challenge	of	a	
coordinated	research	and	policy	plan,	and	later	a	fifth	workshop	to	distill	what	we	learned	
from	the	first	four.	It	was	clear	from	the	start	that	“critical	infrastructure”	had	become	too	
broad	 a	 rubric	 to	 guide	 our	 work.	 In	 the	 United	 States,	 the	 term	 means	 “systems	 and	
assets,	 whether	 physical	 or	 virtual,	 so	 vital	 to	 the	 United	 States	 that	 the	 incapacity	 or	
destruction	 of	 such	 systems	 and	 assets	 would	 have	 a	 debilitating	 impact	 on	 security,	
national	economic	security,	national	public	health	or	safety,	or	any	combination	of	those	
matters.”28
	
	
Sixteen	sectors	have	now	been	designated	“critical.”		We	therefore	selected	four	
sectors	we	deemed	most	critical,29
	and	scheduled	the	following	day-long	workshops,	all	
held	in	Cambridge,	Massachusetts	at	MIT:	
	
● Electricity	 	 	 	 October	8,	2015	
● Finance	 	 	 	 November	5,	2015	
● Communications	 	 	 December	3,	2015	
● Oil	and	Natural	Gas	(ONG)	 	 February	8,	2016	
● Final	Workshop	 	 	 May	2,	2016	
																																																								
28
	42	U.S.C.	§	5195c	(e).	
29
	Time	constraints	precluded	an	additional	workshop	on	the	transportation	sector.
MIT	Center	for	International	Studies																			26																				MIT	Internet	Policy	Research	Initiative																		
	
	
Participants	came	from	key	industry	firms	in	the	United	States,	Canada,	Japan,	and	
Europe;	 from	 pertinent	 government	 offices,	 from	 MIT,	 and	 from	 Carnegie-Mellon	
University.	 Most	 of	 the	 MIT	 participants	 and	 several	 of	 the	 industry	 and	 government	
participants	attended	all	the	workshops.	We	limited	attendance	to	twenty	people	at	each	
workshop	and	did	not	ask	for	prepared	presentations.	Instead	we	asked	participants	to	do	
three	things:	
	
1. Describe	their	most	severe	challenges	in	terms	of	systemic	issues;	
2. Describe	the	characteristics	of	a	more	secure	environment	for	IT	and	the	OT	linked	
to	it;	and	
3. Identify	 the	 technical,	 political,	 and	 economic	 impediments	 to	 achieving	 those	
characteristics.	
	
Each	workshop	took	on	a	dynamic	of	its	own.	We	asked	questions	but	did	not	limit	
the	topics	of	discussion.	Not	surprisingly,	some	industry	participants	had	difficulty	framing	
questions	 in	 strategic	 terms,	 while	 some	 academic	 participants	 had	 difficulty	 framing	
theoretical	questions	that	were	relevant	to	the	concerns	of	the	industry	participants.	Yet	
each	 workshop	 produced	 spontaneous,	 lively	 discussions	 that	 served	 to	 frame	 and	
sharpen	issues.	Although	we	asked	participants	to	address	the	three	questions	just	stated,	
the	output	of	each	workshop	fell	into	a	simpler	dyad:	a	consensus	list	of	the	greatest	risks	
to	the	sector,	and	a	consensus	list	of	most	important	challenges	for	the	sector.	Except	for	
certain	 regulatory	 issues,	 every	 major	 challenge	 was	 discussed	 in	 every	 workshop.	 If	 a	
challenge	 appears	 in	 the	 account	 of	 one	 workshop	 but	 not	 another,	 that	 is	 because	 it	
received	the	most	emphasis	in	that	workshop.	
	
To	create	a	research	agenda,	we	convened	a	fifth	workshop	of	twenty	participants	
selected	 from	 the	 previous	 workshops	 and	 presented	 them	 with	 a	 distillation	 of	 ideas	
from	the	previous	sessions.	We	asked	them	to	identify	the	most	critical	challenges	across	
all	 sectors	 and	 to	 turn	 those	 challenges	 into	 questions	 amenable	 to	 research.	 The	
outcome	of	that	workshop	formed	the	basis	of	the	IRPI-CIS	statement	of	the	seven	high-
level	challenges	and	the	related	recommendations	and	research	questions	in	this	report.
MIT	Center	for	International	Studies																			27																				MIT	Internet	Policy	Research	Initiative																		
	
The	Sector-Specific	Workshops	
	
	 1.	Electricity	Sector	Workshop	
	
	 Electricity	sits	at	the	base	of	any	modern	society’s	operational	structure.	Nearly	all	
economic	and	social	activity	depends	on	it.	Not	surprisingly,	the	risk	most	feared	in	this	
workshop,	even	more	than	loss	of	information,	was	disruption	of	service.	
	
The	electricity	sector	operates	in	a	unique	and	complex	regulatory	environment	
and	 displays	 striking	 internal	 differences,	 especially	 between	 the	 larger	 firms	 and	 the	
smaller	 enterprises	 and	 cooperatives.	 Electricity	 transmission	 in	 the	 United	 States30
	 is	
governed	by	federal	law,	but	delivery	is	regulated	by	the	fifty	states	and	the	territories	in	
inconsistent	ways.	As	a	general	matter,	regulated	entities	are	entitled	to	a	specified	rate	
of	return	on	expenditures	allowed	into	their	rate	base,	as	determined	by	their	regulator.	
They	 therefore	 have	 an	 incentive	 to	 make	 expenditures	 allowable	 into	 that	 base.	
According	to	our	industry	participants,	state	regulation	has	historically	been	consistent	in	
its	 emphasis	 on	 rate	 regulation,	 which	 is	 a	 politically	 sensitive	 topic,	 and	 on	 safety.	
Expenditures	calculated	to	lower	rates	(such	as	software	designed	to	create	efficiencies)	
or	to	improve	safety	are	favored,	they	said.	In	contrast,	network	security	has	not	been	a	
regulatory	focus,	and	some	participants	asserted	that	capital	expenditures	necessary	to	
defend	digital	systems	are	more	difficult	candidates	for	regulatory	approval.	Because	of	
the	 asserted	 difficulty	 of	 assigning	 a	 return	 on	 investments	 in	 network	 security,	 such	
expenditures	 were	 also	 more	 difficult	 candidates	 for	 corporate	 approval,	 according	 to	
these	 participants.	 These	 statements	 should	 be	 verified	 because,	 if	 true,	 these	 factors,	
together	with	the	long	lifespan	of	much	of	the	sector’s	OT,	would	impede	the	adoption	of	
needed	security	measures.	
	
The	Most	Severe	Risks	
	
Risk	1:	Risk	from	aging	operating	systems	retrofitted	with	digital	controls.	
	
Most	participants	believed	the	most	important	risk	factor	for	their	sector	was	the	
networking	 of	 aging	 valves,	 pumps,	 and	 other	 hardware	 that	 were	 designed	 to	 be	
physically	isolated	and	locked	up,	but	which	are	now	accessible	remotely.	Many	of	these	
operating	components	were	twenty	or	more	years	old.	They	now	form	parts	of	systems	
that	 were	 retrofitted	 (“cobbled	 together”)	 to	 be	 electronically	 accessible	 through	
acquisition	 programs	 that	 failed	 to	 take	 the	 resulting	 vulnerabilities	 into	 account.	 A	
participant	compared	the	state	of	the	industry	to	the	Office	of	Personnel	Management,	
which	had	digitized	old	systems	without	understanding	the	vulnerabilities	thus	created.	
																																																								
30
	The	U.S.	electric	grid	is	better	described	as	being	part	of	the	North	American	electric	grid.	There	are	
many	dependencies	at	the	grid	level	between	the	U.S.	and	Canada.
MIT	Center	for	International	Studies																			28																				MIT	Internet	Policy	Research	Initiative																		
	
	
Participants	 also	 stated	 that	 no	 one	 fully	 understood	 the	 extent	 to	 which	 the	
electricity	industry	is	tightly	coupled	with	other	sectors,	and	therefore	did	not	sufficiently	
understand	the	risk	of	catastrophic,	macroeconomic	failure.	There	was	support	for	the	
view	that	the	Department	of	Energy	should	be	more	concerned	about	disruptions	lasting	
longer	than	two	to	three	weeks.	
	
Risk	2:		Risk	from	third-party	access.	
	
One	participant	identified	his	company’s	chief	risk	as	unauthorized	external	access	
to	 networks	 and	 systems	 owing	 to	 the	 extension	 of	 access	 privileges	 to	 third	 parties,	
mostly	vendors	and	other	contractors.		All	agreed	this	was	a	significant	risk	factor.	Some	
doubted	 whether	 meaningful	 network	 perimeters	 still	 exist.	 In	 some	 cases,	 companies	
required	 dual-factor	 identification	 and	 the	 use	 of	 a	 VPN	 to	 engage	 in	 remote	
maintenance,	but	if	the	threat	arose	in	a	trusted	vendor’s	system,	as	some	thought	likely,	
those	steps	did	not	help.	
	
Data	centers	and	the	increasingly	ubiquitous	Internet	of	Things	(“IoT”)	also	created	
third-party	 risk.	 The	 IoT	 created	 an	 attack	 surface	 that	 was	 huge	 and	 expanding	
dramatically,	and	many	of	the	connected	devices	related	to	energy	consumption	and	had	
little	or	no	security	designed	into	them.	If	attacked,	these	devices	could	cause	localized	
failure	 and	 be	 used	 to	 steal	 customer	 information.	 They	 could	 also	 be	 organized	 into	
botnets	 to	 attack	 any	 sector	 of	 the	 economy.	 That	 observation	 has	 since	 been	 borne	
out.31
	
	
Risk	3:	Risk	Created	by	Regulatory	Emphasis	on	Compliance	versus	Security.	
	
Participants	stated	there	was	a	confusion	among	many	executives	and	regulators	
about	 the	 difference	 between	 compliance	 with	 published	 standards	 and	 adequate	
security.	 That	 confusion	 is	 not	 restricted	 to	 this	 sector.	 In	 contrast,	 no	 such	 confusion	
exists	among	security	professionals,	who	understand	that	compliance	certifications	are	a	
necessary	 condition	 of	 doing	 business	 but	 insufficient	 because	 they	 do	 not	 adequately	
address	constantly	changing	risks.	Some	participants	also	stated	that	the	basic	compliance	
standard	 issued	 by	 the	 North	 American	 Electric	 Reliability	 Corporation,	 known	 as	 the	
“NERC	 CIP,”	 compared	 unfavorably	 to	 standards	 issued	 by	 the	 Payment	 Card	 Industry.	
Compliance	is	check-list	oriented	and	gives	a	false	impression	of	security.	Participants	also	
emphasized	cultural	factors,	noting	that	the	oil-and-gas	sector’s	concerted	emphasis	on	
physical	safety	may	be	a	model	for	an	emphasis	on	security.	
	
																																																								
31
	David	E.	Sanger	and	Nicole	Perlroth,	“A	New	Era	of	Internet	Attacks	Powered	by	Everyday	Devices	,”	
New	York	Times,	October	22,	2016,	at	http://www.nytimes.com/2016/10/23/us/politics/a-new-era-of-
internet-attacks-powered-by-everyday-devices.html?_r=0,	accessed	October	25,	2016.
MIT	Center	for	International	Studies																			29																				MIT	Internet	Policy	Research	Initiative																		
	
The	Challenges	
	
The	 electricity	 workshop	 identified	 high-level	 security	 objectives	 supported,	 in	
most	cases,	by	more	detailed	objectives	necessary	to	achieve	them.	Most	of	the	identified	
challenges	were	economic,	commercial,	and	legal	rather	than	technical.	In	nearly	all	cases,	
however,	meeting	the	objectives	would	require	a	substantial	effort	simply	to	gather	the	
data	necessary	for	high-quality	analytics.	Obtaining	the	necessary	data	in	ways	that	did	
not	create	additional	risk	for	the	data	provider	would	itself	be	a	significant	challenge.	
	
Challenge	1:	Quantifying	risk	at	the	enterprise,	sectoral,	and	macroeconomic	levels.	
	
There	 was	 general	 agreement	 that	 quantifying	 risk	 was	 both	 difficult	 and	
necessary.	 As	 one	 participant	 stated,	 a	 dollar	 spent	 on	 “vegetation	 management”	
(trimming	 trees)	 was	 more	 valuable	 to	 his	 company’s	 board	 than	 a	 dollar	 spent	 on	
cybersecurity,	 because	 its	 effect	 could	 be	 measured,	 whereas	 network	 risk	 could	 not.	
Participants	 also	 stated	 that	 baselining	 risk	 –	 that	 is,	 describing	 the	 current	 state	 of	 a	
network	–	was	difficult	but	necessary	to	quantify	risk.	One	participant	stated	that	many	
utilities	 do	 not	 even	 own	 their	 own	 data,	 which	 would	 be	 required	 for	 risk	 analysis,	
intelligence	gathering,32	and	prediction.	
	
Challenge	2:	Measuring	and	reducing	intra-sector	and	cross-sector	fragilities	through	
simulation-based,	cross-sector	exercises.	
	
These	fragilities	were	insufficiently	understood.	There	are	about	3000	utilities	in	
the	 United	 States,	 but	 seven	 utility	 holding	 companies	 serve	 about	 70%	 of	 U.S.	
customers.33	 The	 level	 of	 operating	 and	 security	 sophistication	 in	 the	 market	 was	 not	
uniform.	 More	 attention	 should	 be	 paid	 to	 IT/OT	 inter-connection	 risk	 across	 this	
disparate	market	and	to	coordinating	defenses.	There	was	general	agreement	that	the	
electricity	sector	lagged	the	financial	sector	in	this	regard,	and	that	sectors	were	tightly	
coupled.	Participants	did	not	believe	the	country	could	detect	a	series	of	rolling,	low-level	
events	that	could	precipitate	a	crisis.	Participants	broke	this	challenge	into	three	parts:	
	
a. Compile	the	data	required	for	quality	simulations.	Exercises	between	the	electric	
and	the	financial	sectors	could	yield	major	security	gains,	participants	believed.	
Various	 exercises	 coordinated	 by	 the	 Treasury	 Department	 and	 the	 Financial	
																																																								
32
	 The	 U.S.	 Department	 of	 Energy	 (DoE)	 has	 spearheaded	 an	 effort	 called	 the	 Cybersecurity	 Risk	
Information	Sharing	Program,	or	CRISP,	to	share	classified	as	well	as	unclassified	information	in	this	
sector.	See	letter	of	Patricia	Hoffman,	Assistant	Secretary,	DoE	Office	of	Electricity	Delivery	and	Energy	
Reliability	 to	 Tom	 Fanning	 and	 Fred	 Gorbet,	 August	 5,	 2014,	 at	
http://www.nerc.com/pa/CI/Resources/Documents/Department%20of%20Energy%20Letter%20-
%20Cybersecurity%20Risk%20Information%20Sharing%20Program%20(CRISP).pdf,	accessed	January	6,	
2017.	
33
	Information	courtesy	of	the	Edison	Electric	Institute.
MIT	Center	for	International	Studies																			30																				MIT	Internet	Policy	Research	Initiative																		
	
Services	 Sector	 Coordinating	 Council	 were	 a	 good	 model.34
	 But	 simulations	
require	large	quantities	of	good	data,	which	firms	have	been	reluctant	to	share.	
Utilities	 measure	 success	 based	 on	 reliability,	 safety,	 low	 costs,	 and	 consumer	
satisfaction.	What	data	would	induce	companies	to	add	network	security	to	this	
list?35
	
	
b. Secure	the	participation	of	state,	local,	and	federal	governments	in	cross-sector	
simulation	exercises.	A	series	of	disaster	exercises	called	Gridex	now	exists,	but	it	
is	limited	to	public-sector	stakeholders.	In	the	next	scheduled	exercises,	planned	
for	 the	 autumn	 of	 2017,	 “participation	 is	 open	 only	 to	 registered	 utilities	 and	
others	specifically	invited	by	the	utility	(e.g.,	vendors,	local	law	enforcement).”36
	
Additional	 exercises	 should	 broaden	 participation	 in	 the	 public	 and	 private	
sectors.	
	
c. In	a	collaboration	between	MIT	and	industry,	develop	realistic	scenarios	for	
simulation	exercises.	
	
Challenge	3:	Creating	a	model	for	a	rational	regulatory	scheme	that	would	align	
investment	and	security	requirements	with	risk.	
	
Many	 participants	 stated	 that	 prevailing	 regulatory	 regimes	 create	 intense	
pressure	to	adopt	software	technology	without	any	pressure	to	secure	it.	The	following	
specific	steps	toward	creating	a	better	model	were	proposed:	
	
a. Perform	 a	 comparative	 analysis	 of	 state	 regulation	 of	 electric	 utilities	 in	
Massachusetts,	 Rhode	 Island,	 and	 New	 York.	 An	 industry	 participant	 with	
experience	in	these	jurisdictions	stated	that	studying	their	differences	would	be	
enlightening.	
	
b. Compare	 data	 integrity	 measures	 in	 the	 electric	 and	 financial	 sectors.	 The	
financial	sector	was	said	to	be	intensely	concerned	with	data	integrity	and	was	
more	advanced	than	this	sector	in	securing	it.	
	
																																																								
34
	See,	e.g.,	Sean	Waterman,	“Bank	regulators	briefed	on	Treasury-led	cyber	drill,”	FedScoop,	July	20,	
2016,	 at	 http://fedscoop.com/us-treasury-cybersecurity-drill-july-2016,	 accessed	 November	 8,	 2016;	
U.S.	 Department	 of	 Treasury,	 “Joint	 Statement	 from	 the	 U.S.	 Department	 of	 The	 Treasury	 and	 Her	
Majesty’s	 Treasury,”	 November	 12,	 2015,	 at	 https://www.treasury.gov/press-center/press-
releases/Pages/jl0262.aspx,	accessed	November	8,	2016.	
35
	 A	 participant	 noted	 that	 the	 automobile	 industry	 had	 created	 massive	 cyber	 vulnerabilities	 in	
vehicles,	but	that	the	industry	is	fixing	them	now	because	the	potential	liabilities	could	be	very	large.	
Regulated	utilities	were	said	not	to	face	a	comparable	risk.	
36
	 NERC,	 “GRIDEX	 IV	 Frequently	 Asked	 Questions,”	 p.	 1,	 December	 2,	 2016,	 available	 at	
http://www.nerc.com/pa/CI/CIPOutreach/Pages/GridEX.aspx,	accessed	January	5,	2017.
MIT	Center	for	International	Studies																			31																				MIT	Internet	Policy	Research	Initiative																		
	
c. Study	nuclear	regulation	as	a	potential	model	for	the	regulation	of	non-nuclear	
electricity.	A	participant	stated	that	the	nuclear	industry	went	from	a	prescriptive	
to	 a	 performance-based	 regulatory	 regime,	 recognizing	 that	 technologies	 were	
advancing	more	quickly	than	regulation	could	keep	up.	
	
d. Optimize	legal,	regulatory,	and	tax,	policy	for	security	investment	to	maximize	
investment	incentives	and	place	costs	where	they	can	be	reflected	in	the	price	
of	the	goods	and	services	produced.	Existing	regulatory	schemes	and	tax	policy	
did	not	do	this,	according	to	participants.	There	was	broad	but	not	unanimous	
support	 for	 the	 view	 that	 liability	 should	 play	 a	 greater	 role	 in	 driving	 better	
network	security,	and	that	now	it	plays	almost	none.	
	
Challenge	4:	Supporting	a	market	for	simpler,	less	vulnerable	technology.	
	
The	 widespread	 use	 of	 field-programmable	 gate	 arrays37
	 and	 multi-purpose	
controls	were	cases	in	point.	Both	were	cheaper	to	produce	than	special-purpose	devices	
and	 were	 highly	 capable	 –	 but	 were	 therefore	 more	 vulnerable.	 Creating	 a	 market	 for	
limited-purpose	devices	was	seen	as	more	of	a	political	and	economic	challenge	than	a	
technical	 one.	 In	 this	 regard,	 some	 participants	 wanted	 to	 explore	 the	 use	 of	 analog	
devices	within,	or	alongside	digital	systems,	especially	at	end	points.	
	
Challenge	5:	Improving	human	expertise	in	network	management.	
	
a. Identify	the	skill	sets	uniquely	required	in	this	sector	and	expand	the	talent	
pool.	 There	 are	 not	 enough	 qualified	 operating	 engineers	 and	 computer	
scientists	who	understand	the	challenges	unique	to	the	electricity	sector.	
	
b. Investigate	 the	 “Rickover	 Model”	 for	 the	 training	 and	 selection	 of	 navy	
personnel	for	the	nuclear	submarine	service.	When	the	U.S.	Navy	created	a	
nuclear	 submarine	 service,	 Admiral	 Hyman	 Rickover	 required	 applicants	 to	
complete	a	rigorous	training	regimen	for	admission	to	the	service.	Could	that	
model	be	adapted	for	security	professionals	in	this	or	other	sectors?	
	
	 	
																																																								
37
	 “A	 field-programmable	 gate	 array	 (FPGA)	 is	 an	 integrated	 circuit	 designed	 to	 be	 configured	 by	 a	
customer	or	a	designer	after	manufacturing	….	FPGAs	contain	an	array	of	programmable	logic	blocks,	
and	a	hierarchy	of	reconfigurable	interconnects	that	allow	the	blocks	to	be	"wired	together",	like	many	
logic	 gates	 that	 can	 be	 inter-wired	 in	 different	 configurations.”	 “Field-programmable	 Gate	 Arrays,”	
Wikipedia,	 at	 https://en.wikipedia.org/wiki/Field-programmable_gate_array,	 accessed	 December	 12,	
2016.
MIT	Center	for	International	Studies																			32																				MIT	Internet	Policy	Research	Initiative																		
	
Challenge	6:	Integrating	the	Management	of	IT	and	OT.	
	
Each	 utility	 is	 different	 in	 the	 way	 it	 integrates,	 or	 fails	 to	 integrate,	 the	
management	of	operating	technology	(OT)	and	information	technology	(IT).	Some	do	not	
converge	until	the	corporate	level;	others	converge	much	lower	down.	No	one	believed	a	
single	governance	model	would	be	useful,	but	the	group	did	believe	that	IT	and	OT	have	
substantially	converged	–	at	any	rate,	they	have	converged	sufficiently	so	that	operating	
systems	can	now	be	attacked	through	IT	systems.	Management	structures	should	reflect	
that	fact.	
	
a. Unify	 security	 functions.	 In	 the	 view	 of	 many	 participants,	 someone	 in	 the	
enterprise	should	have	a	view	of	the	full	scope	of	security	threat,	from	wherever	
they	came.	The	group	did	not	agree	on	that	person’s	proper	title	and	reporting	
responsibilities,	but	did	agree	that	he	or	she	should	report	to	an	officer	of	the	
company	and	possibly	to	the	board.	
	
b. Optimize	OT/IT	replacement	cycles,	which	are	out	of	synch.	OT	in	this	sector	
has	 historically	 been	 on	 replacement	 cycles	 of	 15-25	 years.	 In	 contrast,	 IT	
measures	technology	generations	in	3-5	years.	These	cycles	should	be	studied	
and	optimized.
MIT	Center	for	International	Studies																			33																				MIT	Internet	Policy	Research	Initiative																		
	
2.	Financial	Sector	Workshop	
	
The	finance	workshop	identified	three	risks	that	were	unique	or	especially	severe	
in	the	sector:	
	
1. Data	integrity	risk;	
2. Systemic	 risk	 to	 the	 financial	 system	 that	 may	 not	 be	 apparent	 when	
considering	enterprises	or	the	sector	in	isolation;	and	
3. Third-party	 risk	 arising	 from	 the	 inability	 to	 alter	 long-term	 contractual	
arrangements	with	other	market	participants.	
	
The	financial	sector	also	shares	risks	common	to	critical	infrastructure,	though	it	
has	the	most	advanced	network	defenses	of	any	sector.	
	
The	Most	Severe	Risks	
	
Risk	1:	Data	Integrity.	
	
Risk	to	the	integrity	of	financial	data	topped	the	list	of	our	participants’	concerns.	
Our	economy	is	based	on	a	system	of	accounts	recording	who	owes	what	to	whom	at	any	
moment.	 Those	 accounts	 are	 digitized,	 and	 so	 are	 back-up	 systems.	 An	 attack	 that	
destroyed	 or	 corrupted	 the	 accounts	 of	 a	 major	 financial	 institution	 could	 wreak	
devastating	 economic	 havoc	 unless	 those	 accounts	 could	 be	 quickly	 and	 reliably	
reconstituted.	The	risk	extends	beyond	banks	to	securities	exchanges,	brokerage	firms,	
investment	companies,	clearing	organizations,	and	other	financial	enterprises.	
	
A	 sophisticated	 network	 attack	 could	 lock-up	 this	 sector.	 A	 logic	 bomb,	 for	
example,	 could	 randomly	 delete	 system	 files.	 According	 to	 one	 participant,	 that	 has	
already	occurred,	and	it	took	time	to	understand	what	had	happened	and	to	fix	it.	But	
disruption	is	only	one	risk	that	could	arise	form	from	data	loss	or	corruption.	A	subtle,	
more	 limited	 operation	 that	 corrupted	 the	 pricing	 of	 selected	 securities,	 for	 example,	
could	be	used	to	manipulate	markets,	create	illegal	profits	and	losses,	and	drive	parties	
out	of	business.	
	
Participants	agreed	that	a	slowly	rolling	attack	on	an	institution	might	create	more	
havoc	 than	 an	 attack	 that	 brought	 the	 institution	 to	 an	 immediate	 halt,	 for	 which	 the	
larger	institutions	prepare.	A	“low	and	slow”	corruption	of	accounts	would	be	difficult	to	
spot,	and	unless	it	were	stopped	quickly,	it	would	infect	back-up	systems,	too.	The	longer	
it	lasted,	the	more	backup	accounts	would	also	be	infected.	Research	that	addressed	this	
risk	would	be	of	great	value.
MIT	Center	for	International	Studies																			34																				MIT	Internet	Policy	Research	Initiative																		
	
Risk	2:	Systemic	Risk	from	Tight	Coupling	Within	and	Across	Sectors.	
	
Participants	 were	 concerned	 about	 the	 cross-sector	 risk	 created	 by	 the	 tight	
coupling	of	finance,	energy,	and	telecommunications,	but	they	were	also	concerned	about	
risk	 from	 tight	 coupling	 within	 their	 sector.	 Several	 participants	 agreed	 that	 financial	
enterprises	assume	that	in	this	space	all	parties	are	managing	their	own	risks	and	that	
systemic	risk	is	therefore	also	being	managed	through	the	sector,	but	they	doubted	this	is	
true.	Notwithstanding	the	perception	that	the	level	of	cooperation	in	this	sector	is	high,	
these	 participants	 believed	 it	 was	 insufficient	 and	 that	 more	 collective	 action	 on	
information	 sharing	 would	 be	 required	 to	 better	 protect	 the	 sector	 from	 attack.	 The	
nuclear	 power	 industry	 was	 cited	 as	 an	 example.	 In	 that	 sector	 there	 was	 widespread	
understanding	that	an	adverse	incident	that	affected	any	of	them	would	adversely	affect	
them	all.	The	financial	sector	was	said	not	to	be	at	that	point.	
	
In	 particular,	 several	 participants	 complained	 of	 poor	 network	 security	 among	
competing	institutions	(“shirking”).	They	gave	two	examples:	(1)	competitors	that	sought	
market	advantage	by	saving	money	on	network	security,	and	(2)	community	banks	that	
lacked	the	financial	and	other	resources	to	make	themselves	reasonably	secure.	As	to	the	
latter,	 participants	 noted	 that	 the	 share	 of	 assets	 controlled	 by	 community	 banks	
continues	 to	 fall,	 so	 some	 questioned	 the	 significance	 of	 this	 risk.	 Others	 noted	 that	
imposing	further	regulation	on	these	banks	would	accelerate	consolidation	in	the	banking	
sector.	However,	that	risk	was	not	equally	troubling	to	everyone	present.	A	participant	
noted	 that	 shirking	 was	 merely	 one	 aspect	 of	 the	 more	 general	 problem	 of	 consistent	
standards.	As	institutions	other	than	banks	and	SEC-regulated	businesses	became	larger	
players,	the	problem	of	inconsistent	regulation	would	present	a	growing	problem.	Several	
participants	stressed	that	one	should	pay	close	attention	to	the	application	of	regulatory	
standards	as	well	as	to	their	content	when	assessing	consistency.	
	
Risk	3:	Contractual	Risk	from	Long-Term	Third-Party	Contracts.	
	
Long-term	 contracts	 with	 other	 institutions	 (which	 some	 participants	 called	
“locked	handshakes”)	were	a	special	example	of	risky	intra-sector	coupling.	The	example	
given	involved	payment	processors,	which	allegedly	employ	hard,	pre-set	passwords	that	
are	not	regularly	rotated,	if	rotated	at	all.	That	kind	of	arrangement	was	said	to	lock	in	
network	access	rights	of	third-parties	with	allegedly	poor	security.	These	contracts	were	
said	 to	 allocate	 risk	 in	 ways	 that	 participants	 believed	 were	 unfair	 and	 that	 were	 not	
foreseen	when	the	contracts	were	made.	These	contracts	can	have	terms	of	twenty	years,	
and	 many	 were	 made	 before	 the	 sector	 fully	 came	 to	 grips	 with	 network	 risk.	 These	
assertions	should	be	tested	empirically.	However,	industry	participants	believed	this	risk	
was	real,	that	the	sector	needed	a	means	to	force	the	renegotiation	of	these	contracts,	
and	 that	 quantifying	 the	 problem	 would	 be	 helpful.	 We	 detected	 a	 willingness	 among	
several	industry	participants	to	favor	a	regulatory	solution	to	this	issue,	and	one	of	them	
specifically	suggested	that	the	issue	could	be	of	interest	to	the	Federal	Trade	Commission
MIT	Center	for	International	Studies																			35																				MIT	Internet	Policy	Research	Initiative																		
	
(which	has	recently	used	Section	5	of	the	FTC	Act38
	to	address	unfair	as	well	as	misleading	
practices	affecting	network	security).	Another	suggested	that	clearing	agencies	might	be	
able	 to	 provide	 leverage	 for	 achieving	 higher	 security	 levels.	 In	 evaluating	 these	
contentions,	attention	must	be	paid	to	the	competitive	interests	involved	as	well	as	to	the	
alleged	security	risks.	
	
	
Risk	4:	Difficulty	of	Identifying	Malicious	Actors.	
	
The	difficulty	of	attributing	behavior	to	malicious	actors	is	an	aspect	of	the	identity	
management	 problem	 common	 to	 every	 sector,	 but	 our	 participants	 stressed	 the	
challenge	 of	 ascertaining	 internal	 as	 opposed	 to	 external	 identities.	 And	 they	 were	
concerned	with	controlling	administrative	privileges	because	most	hacks	they	dealt	with	
involved	abuse	of	administrator	access.	Some	participants	said	that	machines	also	have	
identities	 and	 privileges,	 and	 that	 managing	 identities	 was	 easier	 for	 people	 than	 for	
machines.	 Several	 participants	 stated,	 without	 dissent,	 that	 “operator	 risk”	 –	 that	 is,	
insider	threat	from	malicious	or	simply	negligent	behavior	–	was	a	medium,	not	a	low,	
probability.	 Some	 participants	 agreed	 that	 the	 government’s	 unsuccessful	 efforts	
regarding	 trusted	 identities	 illustrated	 the	 difficulty	 of	 accomplishing	 anything	
comprehensive	in	this	space.	
	
The	Challenges	
	
Challenge	1:	Enhancing	the	integrity	of	backup	systems.	
	
A	slowly	evolving	attack	could	be	a	bigger	threat	to	financial	institutions	than	an	
attack	aimed	at	a	sudden	network	collapse	because	it	would	not	be	discovered	as	quickly	
–	and	possibly	not	until	backup	systems	had	been	infected.	Participants	were	particularly	
interested	in	the	possible	applicability	of	blockchain	technology	to	their	systems	and	the	
status	 of	 blockchain	 research	 to	 the	 latency	 problem	 (that	 is,	 the	 time	 required	 to	
complete	 a	 communication	 or	 transaction).	 Some	 participant	 firms	 are	 investing	 in	
blockchain	research.	
	
	 	
																																																								
38
	15	U.S.C.	§§	41-58,	as	amended.	The	Commission	is	a	consumer	protection	agency,	not	a	financial	
regulator.	 It	 considers	 three	 factors	 in	 determining	 whether	 a	 practice	 violates	 the	 prohibition	 on	
unfair	 consumer	 practices:	 (1)	 whether	 the	 practice	 injures	 consumers;	 (2)	 whether	 it	 violates	
established	public	policy;	(3)	whether	it	is	unethical	or	unscrupulous.”	FTC,	“FTC	Policy	Statement	on	
Unfairness,”	December	17,	1980,	accessed	November	16,	2016.
MIT	Center	for	International	Studies																			36																				MIT	Internet	Policy	Research	Initiative																		
	
Challenge	2:	Identifying	and	reducing	cross-sector	risk	through	joint	cross-sector	
exercises.	
	
Robust	joint	exercises	using	sophisticated	data	would	help	illuminate	the	risk	from	
the	 tight	 coupling	 of	 power,	 finance,	 and	 telecommunications.	 These	 exercises	 would	
elucidate	intra-sector	and	cross-sector	vulnerabilities	and	would	benefit	all	participating	
sectors.	 They	 would	 also	 highlight	 sectoral	 differences	 about	 the	 priorities	 given	 to	
availability,	integrity,	confidentiality	–	another	area	for	potential	research.	
	
	
Challenge	3:	Improving	identity	management	consistent	with	privacy	concerns.	
	
a. Among	Communicants	
	
The	 tension	 between	 privacy	 and	 identity	 management	 among	 communicants	
concerned	 many	 participants,	 but	 there	 was	 widespread	 agreement	 that	 it	 is	
important	to	focus	on	the	specific	information	fields	that	would	be	most	useful,	
and	then	to	determine	whether	and	how	that	data	can	be	shared	consistent	with	
EU	and	US	law.	Several	participants	asserted	that	EU	law	made	it	more	difficult	
to	identify	both	malware	and	malicious	actors	in	their	systems.	
A	non-industry	participant	stated	that	banks	and	credit	card	companies	are	not	
using	in	their	own	networks	the	kinds	of	data-driven	identity	management/risk	
flagging	 techniques	 they	 employ	 to	 monitor	 credit	 risk.	 It	 would	 be	 useful	 to	
know	whether,	why,	and	to	what	extent	this	may	be	true.	
	
b. Among	Providers	
	
It	is	technically	simple	to	divert	large	amounts	of	traffic	when	it	is	“handed	off”	
from	 one	 service	 provider	 to	 another.	 This	 has	 occurred	 several	 times.	 These	
hand-offs	occur	at	border	gateways,	following	border	gateway	protocols	(BGP).	
These	protocols	are	weak,	which	is	to	say	that	identity	assurance39
	is	weak	at	the	
BGP	level	as	well	as	at	the	level	of	individual	communications.	Traffic	diversion	
could	cripple	communications,	and	although	it	would	be	quickly	discovered	and	
repaired,	 the	 delay	 in	 a	 crisis	 could	 be	 critical.	 A	 more	 secure	 version	 of	 BGP	
exists,	called	BGPSEC,	but	few	U.S.	carriers	have	adopted	it,	presumably	because	
they	 do	 not	 expect	 a	 benefit	 from	 adoption	 that	 would	 offset	 its	 cost.	 What	
economic	 or	 other	 factors	 impede	 the	 adoption	 of	 border	 gateway	 protocols	
that	would	make	it	impossible,	or	substantially	more	difficult,	to	divert	network	
traffic?	 How	 can	 those	 factors	 be	 reduced	 or	 eliminated?	 Fixing	 this	 systemic	
weakness	would	not	appear	to	raise	privacy	concerns.	
																																																								
39
	Machines,	systems,	and	regions	of	the	Internet,	as	well	as	persons,	have	identities.
MIT	Center	for	International	Studies																			37																				MIT	Internet	Policy	Research	Initiative																		
	
Challenge	4:	Containing	the	“Blast	Radius”	of	Destructive	Attacks.	
	
It	is	now	widely	understood	that	malware	cannot	reliably	be	kept	out	of	even	very	
sophisticated	and	well-run	systems.	The	challenge	was	therefore	to	contain	its	effects	–	or	
as	one	participant	put	it,	to	contain	its	“blast	radius.”	Participants	returned	several	times	
to	 this	 topic	 and	 were	 deeply	 interested	 in	 technical	 means	 of	 accomplishing	 this	
objective	(e.g.,	flexible	segmentation	and	rapid	reconstruction	of	networks).	
	
Challenge	5:	Modernizing	the	Regulatory	Environment	
	
Regulatory	 challenges	 fell	 into	 two	 groups:	 (i)	 creating	 flexible	 standards	 that	
would	 improve	 security	 as	 well	 as	 guide	 compliance	 (a	 goal	 that	 may	 be	 as	 elusive	 in	
theory	 as	 it	 has	 been	 in	 practice),	 and	 (ii)	 harmonizing	 regulations	 nationally	 and	
internationally.	
	
a. Flexible	Standards	
	
Industry	 participants	 stated	 that	 regulatory	 norms	 are	 not	 adapting	 to	 rapidly	
changing	technology	and	are	rigid	and	costly	without	being	effective.	They	noted	
several	instances	where	firms	were	compliant	with	applicable	standards	but	were	
penetrated	anyway.	They	were	interested	in	seeing	flexible	standards	that	would	
evolve	with	technology	and	reduce	risk	when	implemented	–	like	a	standard	of	
care.	 Participants	 referred	 to	 standards	 issued	 by	 the	 National	 Institute	 of	
Standards	and	Technology	(NIST)	and	the	International	Standards	Organisation.40
	
These	 could	 evolve	 into	 enforceable	 standards	 of	 care,	 but	 legally	 binding	
standards	of	care	usually	evolve	through	litigation;	regulations	are	promulgated.	
	
A	 non-industry	 participant	 stated	 that	 compliance	 and	 risk-based	 standards	 are	
not	 necessarily	 in	 conflict,	 and	 that	 expecting	 government	 or	 a	 standards	
organization	 to	 compel	 virtue	 was	 not	 realistic.	 He	 added	 that	 mandating	 red-
teaming	forces	threat-modeling.	More	broadly,	he	asked	what	success	would	look	
like	under	a	risk-based	approach	and	suggested	this	could	be	a	fruitful	research	
question.	 In	 this	 regard,	 participants	 would	 be	 interested	 to	 know	 whether	
sectoral	stress	tests	could	be	developed.	
	
																																																								
40
	NIST,	“Framework	for	Improving	Critical	Infrastructure	Cybersecurity,”	v.	1.0,	February	12,	2014,	at	
https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-
021214.pdf,	accessed	January	7,	2017;	ISO/IEC	27032:	2012	Information	Technology	–	Security	
Techniques	–	Guidelines	for	Cybersecurity,	July	2012,	at	
http://www.iso27001security.com/html/27032.html,	accessed	January	7,	2017.
Keeping America Safe: Toward More Secure Networks
Keeping America Safe: Toward More Secure Networks
Keeping America Safe: Toward More Secure Networks
Keeping America Safe: Toward More Secure Networks
Keeping America Safe: Toward More Secure Networks
Keeping America Safe: Toward More Secure Networks
Keeping America Safe: Toward More Secure Networks
Keeping America Safe: Toward More Secure Networks
Keeping America Safe: Toward More Secure Networks
Keeping America Safe: Toward More Secure Networks
Keeping America Safe: Toward More Secure Networks
Keeping America Safe: Toward More Secure Networks

More Related Content

What's hot

Governance and Information Technology
Governance and Information TechnologyGovernance and Information Technology
Governance and Information Technologykatieingersoll
 
Revolutionizing Health Care Through Information Technology
Revolutionizing Health Care Through Information TechnologyRevolutionizing Health Care Through Information Technology
Revolutionizing Health Care Through Information TechnologyJonathan C. Javitt, M.D., M.P.H.
 
A COMPARATIVE ANALYSIS OF THE CYBER SECURITY STRATEGY OF BANGLADESH
A COMPARATIVE ANALYSIS OF THE CYBER SECURITY STRATEGY OF BANGLADESHA COMPARATIVE ANALYSIS OF THE CYBER SECURITY STRATEGY OF BANGLADESH
A COMPARATIVE ANALYSIS OF THE CYBER SECURITY STRATEGY OF BANGLADESHijcisjournal
 
Potential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesPotential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesDuane Blackburn
 
Copy of OSTP RFI on Big Data and Privacy
Copy of OSTP RFI on Big Data and PrivacyCopy of OSTP RFI on Big Data and Privacy
Copy of OSTP RFI on Big Data and PrivacyMicah Altman
 
A Global Digital Rulebook? EU and US
A Global Digital Rulebook? EU and USA Global Digital Rulebook? EU and US
A Global Digital Rulebook? EU and USMirela Marcut
 

What's hot (7)

Governance and Information Technology
Governance and Information TechnologyGovernance and Information Technology
Governance and Information Technology
 
Revolutionizing Health Care Through Information Technology
Revolutionizing Health Care Through Information TechnologyRevolutionizing Health Care Through Information Technology
Revolutionizing Health Care Through Information Technology
 
A Methodology for Managing Large-Scale IT Projects
A Methodology for Managing Large-Scale IT ProjectsA Methodology for Managing Large-Scale IT Projects
A Methodology for Managing Large-Scale IT Projects
 
A COMPARATIVE ANALYSIS OF THE CYBER SECURITY STRATEGY OF BANGLADESH
A COMPARATIVE ANALYSIS OF THE CYBER SECURITY STRATEGY OF BANGLADESHA COMPARATIVE ANALYSIS OF THE CYBER SECURITY STRATEGY OF BANGLADESH
A COMPARATIVE ANALYSIS OF THE CYBER SECURITY STRATEGY OF BANGLADESH
 
Potential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesPotential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric Services
 
Copy of OSTP RFI on Big Data and Privacy
Copy of OSTP RFI on Big Data and PrivacyCopy of OSTP RFI on Big Data and Privacy
Copy of OSTP RFI on Big Data and Privacy
 
A Global Digital Rulebook? EU and US
A Global Digital Rulebook? EU and USA Global Digital Rulebook? EU and US
A Global Digital Rulebook? EU and US
 

Viewers also liked

Dontdrinkanddriventsipic
DontdrinkanddriventsipicDontdrinkanddriventsipic
Dontdrinkanddriventsipicntsicorp
 
After tests marzo 2017: Pruebas de Integración Automatizadas con Docker
After tests marzo 2017: Pruebas de Integración Automatizadas con DockerAfter tests marzo 2017: Pruebas de Integración Automatizadas con Docker
After tests marzo 2017: Pruebas de Integración Automatizadas con DockerFernando Llaca Romero
 
Caps & robbers louis sihler
Caps & robbers louis sihler Caps & robbers louis sihler
Caps & robbers louis sihler Louis Sihler
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetWatcher
 
Las Vegas es llamada “La Capital Mundial del Entretenimiento” por una buena r...
Las Vegas es llamada “La Capital Mundial del Entretenimiento” por una buena r...Las Vegas es llamada “La Capital Mundial del Entretenimiento” por una buena r...
Las Vegas es llamada “La Capital Mundial del Entretenimiento” por una buena r...Pablo Carrillo
 
Informe del perfil profesional rima 2016
Informe del perfil profesional rima 2016Informe del perfil profesional rima 2016
Informe del perfil profesional rima 2016Sergio Hinchado Leal
 
Campamento de Verano 2017 Los Alcázares
Campamento de Verano 2017  Los AlcázaresCampamento de Verano 2017  Los Alcázares
Campamento de Verano 2017 Los AlcázaresVeleta3000
 
Campamentos de Verano San Martín de Valdeiglesias 2017
Campamentos de Verano San Martín de Valdeiglesias 2017Campamentos de Verano San Martín de Valdeiglesias 2017
Campamentos de Verano San Martín de Valdeiglesias 2017Veleta3000
 
Closed on sundays louis sihler
Closed on sundays louis sihler Closed on sundays louis sihler
Closed on sundays louis sihler Louis Sihler
 
20170329 D3 DBAが夜間メンテをしなくなった日 発表資料
20170329 D3 DBAが夜間メンテをしなくなった日 発表資料20170329 D3 DBAが夜間メンテをしなくなった日 発表資料
20170329 D3 DBAが夜間メンテをしなくなった日 発表資料dcubeio
 
Lista de exercícios Expressões Numéricas com Números Naturais
Lista de exercícios   Expressões Numéricas com Números NaturaisLista de exercícios   Expressões Numéricas com Números Naturais
Lista de exercícios Expressões Numéricas com Números NaturaisMario Andre Nunes Rodrigues
 
Participatory Design: Discovering Unmet Needs & New Solutions
Participatory Design: Discovering Unmet Needs & New SolutionsParticipatory Design: Discovering Unmet Needs & New Solutions
Participatory Design: Discovering Unmet Needs & New SolutionsJennifer Briselli
 
The Enterprise Service Bus is Dead! Long live the Enterprise Service Bus, Rim...
The Enterprise Service Bus is Dead! Long live the Enterprise Service Bus, Rim...The Enterprise Service Bus is Dead! Long live the Enterprise Service Bus, Rim...
The Enterprise Service Bus is Dead! Long live the Enterprise Service Bus, Rim...confluent
 
Deep dive into PostgreSQL statistics.
Deep dive into PostgreSQL statistics.Deep dive into PostgreSQL statistics.
Deep dive into PostgreSQL statistics.Alexey Lesovsky
 
How to become a data scientist in 6 months
How to become a data scientist in 6 monthsHow to become a data scientist in 6 months
How to become a data scientist in 6 monthsTetiana Ivanova
 
Primer on using Snapchat at #AACR17 and other scientific meetings
Primer on using Snapchat at #AACR17 and other scientific meetingsPrimer on using Snapchat at #AACR17 and other scientific meetings
Primer on using Snapchat at #AACR17 and other scientific meetingsEmil Lou, M.D., Ph.D, FACP
 
Patient engagement in the digital era
Patient engagement in the digital eraPatient engagement in the digital era
Patient engagement in the digital eraDr. Reni Thomas
 

Viewers also liked (20)

Dontdrinkanddriventsipic
DontdrinkanddriventsipicDontdrinkanddriventsipic
Dontdrinkanddriventsipic
 
After tests marzo 2017: Pruebas de Integración Automatizadas con Docker
After tests marzo 2017: Pruebas de Integración Automatizadas con DockerAfter tests marzo 2017: Pruebas de Integración Automatizadas con Docker
After tests marzo 2017: Pruebas de Integración Automatizadas con Docker
 
Caps & robbers louis sihler
Caps & robbers louis sihler Caps & robbers louis sihler
Caps & robbers louis sihler
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
 
Ecossistema de Uso dos dados abertos
Ecossistema de Uso dos dados abertosEcossistema de Uso dos dados abertos
Ecossistema de Uso dos dados abertos
 
Las Vegas es llamada “La Capital Mundial del Entretenimiento” por una buena r...
Las Vegas es llamada “La Capital Mundial del Entretenimiento” por una buena r...Las Vegas es llamada “La Capital Mundial del Entretenimiento” por una buena r...
Las Vegas es llamada “La Capital Mundial del Entretenimiento” por una buena r...
 
Informe del perfil profesional rima 2016
Informe del perfil profesional rima 2016Informe del perfil profesional rima 2016
Informe del perfil profesional rima 2016
 
Campamento de Verano 2017 Los Alcázares
Campamento de Verano 2017  Los AlcázaresCampamento de Verano 2017  Los Alcázares
Campamento de Verano 2017 Los Alcázares
 
Campamentos de Verano San Martín de Valdeiglesias 2017
Campamentos de Verano San Martín de Valdeiglesias 2017Campamentos de Verano San Martín de Valdeiglesias 2017
Campamentos de Verano San Martín de Valdeiglesias 2017
 
Archivematica and the digital archival chain of custody
Archivematica and the digital archival chain of custodyArchivematica and the digital archival chain of custody
Archivematica and the digital archival chain of custody
 
Closed on sundays louis sihler
Closed on sundays louis sihler Closed on sundays louis sihler
Closed on sundays louis sihler
 
20170329 D3 DBAが夜間メンテをしなくなった日 発表資料
20170329 D3 DBAが夜間メンテをしなくなった日 発表資料20170329 D3 DBAが夜間メンテをしなくなった日 発表資料
20170329 D3 DBAが夜間メンテをしなくなった日 発表資料
 
Lista de exercícios Expressões Numéricas com Números Naturais
Lista de exercícios   Expressões Numéricas com Números NaturaisLista de exercícios   Expressões Numéricas com Números Naturais
Lista de exercícios Expressões Numéricas com Números Naturais
 
Participatory Design: Discovering Unmet Needs & New Solutions
Participatory Design: Discovering Unmet Needs & New SolutionsParticipatory Design: Discovering Unmet Needs & New Solutions
Participatory Design: Discovering Unmet Needs & New Solutions
 
The Enterprise Service Bus is Dead! Long live the Enterprise Service Bus, Rim...
The Enterprise Service Bus is Dead! Long live the Enterprise Service Bus, Rim...The Enterprise Service Bus is Dead! Long live the Enterprise Service Bus, Rim...
The Enterprise Service Bus is Dead! Long live the Enterprise Service Bus, Rim...
 
Deep dive into PostgreSQL statistics.
Deep dive into PostgreSQL statistics.Deep dive into PostgreSQL statistics.
Deep dive into PostgreSQL statistics.
 
How to become a data scientist in 6 months
How to become a data scientist in 6 monthsHow to become a data scientist in 6 months
How to become a data scientist in 6 months
 
Primer on using Snapchat at #AACR17 and other scientific meetings
Primer on using Snapchat at #AACR17 and other scientific meetingsPrimer on using Snapchat at #AACR17 and other scientific meetings
Primer on using Snapchat at #AACR17 and other scientific meetings
 
Patient engagement in the digital era
Patient engagement in the digital eraPatient engagement in the digital era
Patient engagement in the digital era
 
WordPressのCDN化
WordPressのCDN化WordPressのCDN化
WordPressのCDN化
 

Similar to Keeping America Safe: Toward More Secure Networks

Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident ResponsePECB
 
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?Brian K. Dickard
 
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial SectorCapitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial SectorCapitolTechU
 
Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”
Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”
Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”KTN
 
61Shackelford & Bohm - Securing North American Critical Infra
61Shackelford & Bohm -  Securing North American Critical Infra61Shackelford & Bohm -  Securing North American Critical Infra
61Shackelford & Bohm - Securing North American Critical Infrasimisterchristen
 
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...Carolin Weisser
 
Assistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docxAssistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docxcockekeshia
 
Intermediary Accountability in the Digital Age
Intermediary Accountability in the Digital AgeIntermediary Accountability in the Digital Age
Intermediary Accountability in the Digital AgeRichard Austin
 
Building A Modern Security Policy For Social Media and Government
Building A  Modern  Security  Policy For  Social  Media and GovernmentBuilding A  Modern  Security  Policy For  Social  Media and Government
Building A Modern Security Policy For Social Media and GovernmentMichael Smith
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesUlf Mattsson
 
Massachusetts Cyber Security Ecosystem
Massachusetts Cyber Security EcosystemMassachusetts Cyber Security Ecosystem
Massachusetts Cyber Security EcosystemBrett Campbell
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
F e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docxF e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docx
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docxssuser454af01
 
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
F e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docxF e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docx
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docxmecklenburgstrelitzh
 
Review of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak MaheshwariReview of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak Maheshwarivpnmentor
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistMatthew Rosenquist
 
Cyber Insurance as Digital Strategy
Cyber Insurance as Digital StrategyCyber Insurance as Digital Strategy
Cyber Insurance as Digital StrategyRandeep Sudan
 

Similar to Keeping America Safe: Toward More Secure Networks (20)

Cybersecurity Day for Parliament
Cybersecurity Day for ParliamentCybersecurity Day for Parliament
Cybersecurity Day for Parliament
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
 
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial SectorCapitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
 
Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”
Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”
Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”
 
61Shackelford & Bohm - Securing North American Critical Infra
61Shackelford & Bohm -  Securing North American Critical Infra61Shackelford & Bohm -  Securing North American Critical Infra
61Shackelford & Bohm - Securing North American Critical Infra
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
 
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
 
Assistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docxAssistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docx
 
Intermediary Accountability in the Digital Age
Intermediary Accountability in the Digital AgeIntermediary Accountability in the Digital Age
Intermediary Accountability in the Digital Age
 
Building A Modern Security Policy For Social Media and Government
Building A  Modern  Security  Policy For  Social  Media and GovernmentBuilding A  Modern  Security  Policy For  Social  Media and Government
Building A Modern Security Policy For Social Media and Government
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
 
Massachusetts Cyber Security Ecosystem
Massachusetts Cyber Security EcosystemMassachusetts Cyber Security Ecosystem
Massachusetts Cyber Security Ecosystem
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
F e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docxF e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docx
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
 
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
F e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docxF e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docx
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
 
Review of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak MaheshwariReview of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak Maheshwari
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 
Business blackout
Business blackoutBusiness blackout
Business blackout
 
Cyber Insurance as Digital Strategy
Cyber Insurance as Digital StrategyCyber Insurance as Digital Strategy
Cyber Insurance as Digital Strategy
 

More from David Sweigert

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)David Sweigert
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting David Sweigert
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisDavid Sweigert
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterDavid Sweigert
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner David Sweigert
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017David Sweigert
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9David Sweigert
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityDavid Sweigert
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)David Sweigert
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsDavid Sweigert
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartDavid Sweigert
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...David Sweigert
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public CommentDavid Sweigert
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public CommentDavid Sweigert
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTDavid Sweigert
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackDavid Sweigert
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTDavid Sweigert
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd editionDavid Sweigert
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanDavid Sweigert
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHSDavid Sweigert
 

More from David Sweigert (20)

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
 

Recently uploaded

Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at workChristina Parmionova
 
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...Suhani Kapoor
 
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...anilsa9823
 
How the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersHow the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersCongressional Budget Office
 
Global debate on climate change and occupational safety and health.
Global debate on climate change and occupational safety and health.Global debate on climate change and occupational safety and health.
Global debate on climate change and occupational safety and health.Christina Parmionova
 
VIP Call Girl mohali 7001035870 Enjoy Call Girls With Our Escorts
VIP Call Girl mohali 7001035870 Enjoy Call Girls With Our EscortsVIP Call Girl mohali 7001035870 Enjoy Call Girls With Our Escorts
VIP Call Girl mohali 7001035870 Enjoy Call Girls With Our Escortssonatiwari757
 
VIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service PuneVIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...ResolutionFoundation
 
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore EscortsVIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escortsaditipandeya
 
Climate change and occupational safety and health.
Climate change and occupational safety and health.Climate change and occupational safety and health.
Climate change and occupational safety and health.Christina Parmionova
 
(DIYA) Call Girls Saswad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIYA) Call Girls Saswad ( 7001035870 ) HI-Fi Pune Escorts Service(DIYA) Call Girls Saswad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIYA) Call Girls Saswad ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
WIPO magazine issue -1 - 2024 World Intellectual Property organization.
WIPO magazine issue -1 - 2024 World Intellectual Property organization.WIPO magazine issue -1 - 2024 World Intellectual Property organization.
WIPO magazine issue -1 - 2024 World Intellectual Property organization.Christina Parmionova
 
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...Hemant Purohit
 
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...Suhani Kapoor
 
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...Suhani Kapoor
 
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 

Recently uploaded (20)

Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at work
 
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
 
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
 
How the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists LawmakersHow the Congressional Budget Office Assists Lawmakers
How the Congressional Budget Office Assists Lawmakers
 
Global debate on climate change and occupational safety and health.
Global debate on climate change and occupational safety and health.Global debate on climate change and occupational safety and health.
Global debate on climate change and occupational safety and health.
 
VIP Call Girl mohali 7001035870 Enjoy Call Girls With Our Escorts
VIP Call Girl mohali 7001035870 Enjoy Call Girls With Our EscortsVIP Call Girl mohali 7001035870 Enjoy Call Girls With Our Escorts
VIP Call Girl mohali 7001035870 Enjoy Call Girls With Our Escorts
 
VIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service PuneVIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Vani 8617697112 Independent Escort Service Pune
 
Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...
 
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore EscortsVIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escorts
 
Climate change and occupational safety and health.
Climate change and occupational safety and health.Climate change and occupational safety and health.
Climate change and occupational safety and health.
 
(DIYA) Call Girls Saswad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIYA) Call Girls Saswad ( 7001035870 ) HI-Fi Pune Escorts Service(DIYA) Call Girls Saswad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIYA) Call Girls Saswad ( 7001035870 ) HI-Fi Pune Escorts Service
 
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
 
WIPO magazine issue -1 - 2024 World Intellectual Property organization.
WIPO magazine issue -1 - 2024 World Intellectual Property organization.WIPO magazine issue -1 - 2024 World Intellectual Property organization.
WIPO magazine issue -1 - 2024 World Intellectual Property organization.
 
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
 
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
 
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
 
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
 
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
 

Keeping America Safe: Toward More Secure Networks

  • 2. MIT Center for International Studies 2 MIT Internet Policy Research Initiative Table of Contents Executive Summary and Recommendations 3 A History of Hesitancy 3 Background: 17 The Persistent Problem 17 Expanding Operational Risk 18 Why Are Systems Insecure? 20 Coordinating Research Policy 24 The Workshop Plan 25 The Sector-Specific Workshops 27 1. Electricity Sector Workshop 27 2. Financial Sector Workshop 33 3. Communications Sector Workshop 40 4. Oil-and-Natural-Gas Sector Workshop 45
  • 3. MIT Center for International Studies 3 MIT Internet Policy Research Initiative Executive Summary and Recommendations A History of Hesitancy The digital systems that control critical infrastructure in the United States and most other countries are easily penetrated and architecturally weak, and we have known it for a long time. Yet Presidential leadership on infrastructure security has been hesitant and chiefly rhetorical, while system operators have tended to focus on short-term fixes and tactical improvements. Much effort has been devoted to developing better security standards,1 but most standards are merely advisory. Key federal departments, notably but not exclusively homeland security, defense, and energy have devoted significant effort to improving infrastructure security. Examples would be too numerous to cite. But these efforts have not altered the strategic balance. Offense remains dominant. To break this cycle, the nation will require a coordinated, multi-year effort to address deep strategic weaknesses in the architecture of critical systems, in how those systems are operated, and in the devices that connect to them. This effort must in part be technically directed, but it will also require a re- evaluation of the laws, regulations, and policies that govern our networks. The challenges we face are not merely technical. They are also economic, managerial, behavioral, political, and legal. Indeed the technical challenges may be the easiest to address. For example, aligning economic, tax, and liability incentives with the goal of higher security is not a technical challenge. Re-aligning incentives would be a daunting task, but our critical infrastructure cannot be made reasonably secure unless we do it. This report identifies the most strategic of those challenges and proposes a policy and research agenda that has the potential to achieve significantly higher levels of security in critical networks over a five- to ten-year period. But the nation must begin now. Our goal is action, both immediate and long-term. To address this task, CIS and IPRI jointly convened a series of workshops focused on four critical economic sectors, all of which are overwhelmingly or entirely in private hands: electricity, finance, communications, and oil-and-natural gas (ONG). We did not set out to write yet another description of the threat to our critical networks. In the wake of repeated, widely reported foreign intrusions into our power grid and banking system and the recent Russian interference in our national election, the threat is well known. Rather, we focused 1 See, e.g., National Institute for Standards and Technology, “NIST Releases Update to Cybersecurity Framework,” January 10, 2017, at https://www.nist.gov/news-events/news/2017/01/nist-releases- update-cybersecurity-framework, accessed February 9, 2017.
  • 4. MIT Center for International Studies 4 MIT Internet Policy Research Initiative on what to do about it. The workshops were attended by experts2 from leading enterprises in each sector, by academic experts in relevant fields, and by a few government officials. We expected commonalities across all four sectors, and we found many. Participants in each sector bemoaned the difficulty of quantifying network risk, for example; and each workshop expressed great interest in techniques of containing cascading failure. But we also encountered differences among sectors – in part because the sectors operate in different regulatory frameworks, and in part because two of these sectors – electricity and oil-and- natural-gas (ONG) – are heavily dependent on industrial operating technology (OT) as well as information technology (IT). Significant differences also exist within sectors as well as between them in their levels of investment in cybersecurity and ability to fend off attacks. We have preserved the essence of the individual workshops in summaries at the back of this report. The Recommendations This report makes both long- and short-term recommendations of broad applicability to critical infrastructure in the United States and, excepting certain legal and regulatory matters, to critical infrastructure globally. The report identifies eight strategic challenges to illuminate our predicament and guide our policy and research. Under each challenge, it makes findings that emerged from the workshops and recommendations to address them. The recommendations cover a wide range of issues, from the organization of cybersecurity in the Executive Office of the President to technical measures of network security and misaligned regulatory incentives. Each of the challenges is then followed by a series of research questions whose answers could help meet that challenge. The report therefore addresses three audiences: government officials, public and private institutions that fund research, and the researchers themselves. By changing and focusing the research environment, IPRI and CIS believe the nation could materially improve our long-term security environment. We emphasize the coordination of funding, however; we do not propose budgetary measures. 2 Participants were free to use any information received, but neither the identity nor the affiliation of any speaker or participant could be revealed. Industry participants came from ten private energy companies in the United States, Canada, France, and the United Kingdom, including two of the oil majors; four leading international banks, a major data processor for financial institutions, and a leading securities clearing organization; two tier-one communications providers; a leading computer chip manufacturer; a leading maker of commercial and consumer software; and representatives of the Government of Canada, the U.S. departments of homeland security and energy, and the Office of the Governor of Massachusetts. Participants from firms and governments in India and from another U.S. university were invited but did not attend. The views expressed in this report do not necessarily reflect those of individual workshop participants or of their enterprises and agencies.
  • 5. MIT Center for International Studies 5 MIT Internet Policy Research Initiative Some of these research questions we pose are broad and technical (e.g., Can cyber risk be measured?); others are narrow and focus on non-technical impediments to adopting technically available security measures (e.g., What economic or other factors impede the adoption of secure connections between service providers?). Differences in generality were unavoidable if we were to describe the full range of technical and policy questions that must be answered, especially because many of the impediments are legal, economic, and political rather than technical. Taken together, these questions should form the basis of a focused, national agenda that must be adopted, coordinated, and funded if we are to escape from a twenty-five-year cycle of futile tactical measures and imprecise aspirational statements from a never-ending series of governmental and private groups. The nation can no longer afford a pattern of uncoordinated executive action and scattershot research. Total security is not achievable. But a materially improved security environment for the infrastructure on which virtually all economic and social activity depend can be created with sufficient resources and political will. Achieving this goal will require a more determined and more directive approach from the highest levels of government and industry. It will also require more energetic and coordinated steps from the President than any of his predecessors has been willing to take.
  • 6. MIT Center for International Studies 6 MIT Internet Policy Research Initiative FINDINGS AND RECOMMENDATIONS FIRST CHALLENGE Improve Coordination. Finding: Critical infrastructure defense is insufficiently coordinated across the government. Changing the status quo will require a more directive effort from the White House. Recommendation: The President should elevate his cybersecurity advisor to the position of deputy national security advisor for cybersecurity. That official should be directed and empowered to work with the Office of Management and Budget (OMB) to focus long-term policy across the government on the substantive challenges identified below and to produce on an accelerated schedule a federal research agenda and budget for the cybersecurity of critical infrastructure focused on these same challenges. OMB should determine that funds are spent accordingly. SECOND CHALLENGE Measure cyber risk and infrastructure fragility. Finding: Quantifying risk in either absolute or relative terms is a difficult challenge that impedes cybersecurity investment in all sectors examined except certain financial institutions. The asserted inability to measure the rate of return on cybersecurity investment is a closely related problem3 that affects overall investment levels and makes it difficult to target investment. Fragility of systems is a salient aspect of risk that concerned participants in all sectors. Absent assurances of confidentiality, candid participation by the private sector will not occur. However, the public should be informed of the general state of security of critical infrastructure. 3 Most participants accepted the view that cyber risk, changes in cyber risk resulting from a specific security investment, and the rate of return on that kind of investment could not be measured. For the contrary view, see Douglas W. Hubbard and Richard Seiersen, How to Measure Anything in Cybersecurity Risk (New York, 2016).
  • 7. MIT Center for International Studies 7 MIT Internet Policy Research Initiative Recommendation: The President should direct the lead departmental secretary to convene on an accelerated schedule a meeting of representatives of the relevant national laboratories and other experts to assess impediments to measuring cyber risk and fragility and to recommend a national strategy to meet this challenge. The meeting should be closed to the public and its proceedings, though not the strategy, should be kept confidential. Research Questions: 1. Can cyber risk or network fragility be measured? Can changes in risk as the result of specific security investments be measured? If so, why are enterprises not doing it? 2. Would the answers to these questions produce more rational decision-making by enterprises? If not, why not? 3. Can simulation-based modeling be used to create cybersecurity stress-tests for critical sectors? In the electricity sector, could that type of modeling be used to test the ability to “cold start” electricity generation? Can the results of such modeling be protected from public disclosure? How, and at what level of generality, should the public be informed of vulnerabilities in critical systems? 4. Should the answers to these questions have regulatory implications for some or all critical sectors? 5. Can the necessary de-identified4 data be obtained to support research into these questions? Would legislation be appropriate to compel the production of that de- identified data in the interest of national security – but with an exemption from disclosure and under a legal privilege that would prevent its use for any other purpose?5 How would the required data be defined, and who should hold it? 4 De-identification means removing identifying aspects of data so that, practically speaking, it would be difficult and expensive to re-associate it with a particular person. Perfect anonymization of data is not possible in most circumstances. 5 The National Infrastructure Protection Act, codified as 42 U.S.C. §§ 5195c et seq., does not clearly give the Department of Homeland Security power to require production of specific categories of data from private firms. See 42 U.S.C. § 5195c (d)(2)(A) and (B).
  • 8. MIT Center for International Studies 8 MIT Internet Policy Research Initiative THIRD CHALLENGE Review laws and regulations with the goals of reducing risk and optimizing security investment. Finding: Participants from all sectors overwhelmingly believed there was a material disconnection between mandatory compliance regimes and improvements in cybersecurity. Most participants from all sectors except finance believed that federal tax and regulatory incentives for higher levels of cybersecurity investment should be considered. Many participants from the electricity and telecommunications sectors believed that regulations either impeded or did not encourage higher levels of cybersecurity investment. Recommendations: The President should propose legislation at the earliest opportunity for the more favorable tax treatment of qualified cybersecurity investment in critical infrastructure and, potentially, throughout the economy, including investment necessary to convert to a more secure DNS and to more secure border gateway protocols. To qualify for favorable treatment, investments should be in products and services that are demonstrably compliant with the framework promulgated by the National Institute for Standards and Technology (NIST).6 The secretary of energy, state public utility commissioners, and the National Association of Regulated Utility Commissioners should forthwith examine the effect of utility regulation on cybersecurity with particular attention to (i) the effect of current regulations on cybersecurity investment and (ii) the usefulness of current compliance standards in achieving higher levels of security. 6 National Institute for Standards and Technology, “Framework for Improving Critical Infrastructure Cybersecurity,” version 1.0, February 12, 2014, at https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework- 021214.pdf, accessed February 20, 2017. For draft version 1.1 of the Framework, see https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework- 021214.pdf, accessed February 20, 2017.
  • 9. MIT Center for International Studies 9 MIT Internet Policy Research Initiative Research Questions: 1. How should liability rules and regulations be optimized to produce more secure behavior by vendors and by the owners and operators of infrastructure? A comparative study of state as well as federal regulatory models would be useful in addressing this question. 2. Can cybersecurity regulation be harmonized across government? Government regulates by sector. For example, the Federal Communications Commission regulates telecommunications; the Treasury Department, the Federal Reserve, and other agencies regulate banks; the Energy Department, the Environmental Protection Agency, and the states regulate energy, and so on. But as these “vertical” regulators have also begun to regulate cybersecurity, a complex of overlapping, expensive, and potentially inconsistent standards is emerging. Are these regulations driving greater security, or are they merely more elaborate and expensive compliance regimes? 3. The many competing compliance standards create confusion. Should the government make the NIST Framework, and only the NIST Framework, a single mandatory standard across government and for contractors dealing with the government? 4. Could the financial impact on insurers and re-insurers of the damage resulting from a successful attack on one or more critical sectors be absorbed by them? If not, what law and policy would be required to make it likely that such losses could be absorbed? 5. Can the necessary, de-identified data be obtained to support research into these questions? If not, would legislation be appropriate to compel the production of that de-identified data in any sector while protecting the rights of the enterprises that would produce the data? How would the required data be defined? FOURTH CHALLENGE Enable critical infrastructure operators to quickly identify and respond to cyber risk arising from cross-sector linkages as well as from their own networks. Finding: All sectors depend on electricity, and the financial sector’s global platform supports transactions with energy and telecommunications. These and other linkages create possibilities for cascading failure that are insufficiently understood and not adequately illuminated by sector-specific
  • 10. MIT Center for International Studies 10 MIT Internet Policy Research Initiative simulations and other testing. Participants from all sectors stated emphatically that cooperation on pooling proprietary data and candor regarding the results of testing could not be achieved unless parties could be assured that the data and results would remain confidential and could not be used for other purposes. Recommendation: The President should direct the lead departmental secretary to convene on an accelerated schedule a meeting of representatives of the nation’s leading industrial insurers and other experts to examine the steps necessary to enable more robust cross-sector simulations, including the sharing of data, and to make appropriate recommendations to the President. The meeting should be closed to the public and its proceedings kept confidential, but the resulting recommendations should be public. Research Questions: 1. What steps would increase the likelihood of early detection of a slow-moving strategic attack on a critical sector or across critical sectors? How will detection techniques be affected by the anticipated move to IPv6?7 2. How would such an attack affect critical backup systems? 3. Can simulation-based modeling be used to create better cross-sector stress tests? 4. Can simulated cyber disasters help determine how communications should be prioritized in the event of a national emergency? 5. Can efforts to use big data and fast processing to quickly detect intrusions in critical networks be accelerated? 6. What, if anything, prevents the effective use of identity management tools across the full range of steps necessary to execute a successful exploit or attack? 7 IPv6 is an Internet addressing protocol that would expand the number of IP addresses available under the current protocol, called IPv4, by a factor of 7.9 x 1028 . It could therefore render ineffective current techniques for scanning systems for malware because the address space to be scanned would be exponentially larger.
  • 11. MIT Center for International Studies 11 MIT Internet Policy Research Initiative FIFTH CHALLENGE Reduce component complexity and the vulnerabilities inherent in them. Finding: Participants from the electricity and energy and oil-and-natural gas (ONG) sectors believed that unduly complex, and insufficiently secure, hardware, software, and industrial controls were a significant source of cyber vulnerabilities that created physical danger as well as risk to information. Participants from the ONG sector were emphatic on this point. Both energy sectors are highly dependent on industrial operating technology. This is a significant supply chain risk created by commercial, not technological, factors. Suppliers find it profitable to market cheap, general purpose hardware and software for multiple uses, regardless of differing security tolerations in different sectors and uses. Recommendation: The President should direct the lead departmental secretary to report to him on an accelerated schedule on the feasibility, timeline, and expense of supporting and otherwise incentivizing the production and use of more secure and less complex hardware, software, and controls for use in critical infrastructure. Research Questions: 1. Can the technical, economic, and regulatory obstacles to reducing complexity in both information technology and industrial operating technology be identified? 2. Field programmable gate arrays (multipurpose computer chips) are cheap, so they are used for many purposes including commercial routers and industrial controls used in critical infrastructure operations, but their complexity and superfluous functionality increase risk. The same may be said of general purpose processing units, operating systems, and software systems. a. Can standards be established to reduce the vulnerabilities in logic processors and the software and firmware that control them? b. Can standards be established, or incentives created, to phase out design tools that permit hardware and software designers to make the same basic errors repeatedly, such as allowing buffer overflows?
  • 12. MIT Center for International Studies 12 MIT Internet Policy Research Initiative c. What steps would be necessary to establish a certification system for hardware and software, possibly modeled on the Underwriters Laboratory for electrical products? d. Can microchips be designed so that entire sectors of those chips can be cheaply, reliably, and verifiably disabled so that functionality matches task requirements? 3. What incentives should be in place to induce controls manufacturers and Internet service providers to use less vulnerable chips? 4. Are the departments of defense, energy, and homeland security optimizing their role in creating and supporting a market for simpler and more secure commercial devices in critical infrastructure? For example, can these departments jointly establish metrics for complexity and standards for controls, and use their procurement decisions to favor less complex and more secure hardware and software? 5. Can simpler firmware and operating systems be cost-effectively developed and marketed for use in critical infrastructure? Sixth Challenge Address fundamental issues of system architecture. Findings: 1. The Internet is a legacy system designed for non-commercial uses with little or no need for security. Security has chiefly been an option for end points, which frequently ignore it in favor of speed-to-market and low costs. Hardware and software that run on the Internet display wide differences in security, and the tools for creating hardware and software enable many of the same security errors to be repeated over many years, without liability. 2. Security professionals from all sectors overwhelmingly believed that certain aspects of their systems could not otherwise be made reasonably secure unless isolated from public networks. There are significant differences of opinion about appropriate degrees of isolation.
  • 13. MIT Center for International Studies 13 MIT Internet Policy Research Initiative Recommendations: 1. The President should direct the secretaries of energy and homeland security: a. in consultation with the Federal Energy Regulatory Commission (FERC), to explore the feasibility, expense, and timelines of isolating from public networks8 all controls and operations of activities within FERC’s jurisdiction,9 to define acceptable degrees of isolation, and to report to the President on an accelerated schedule; an b. in coordination with the FERC and the North American Electric Reliability Corporation (NERC),10 to convene at the earliest practical time a conference of state electricity regulators to explore the feasibility and expense of isolating key elements of electricity generation and delivery from public networks. 2. The President should direct the lead departmental secretary to consult with key stakeholders, including vendors, users, the public, and the insurance industry, about the desirability and feasibility of (i) establishing legally binding standards of care in the manufacture of hardware and software for critical infrastructure, and (ii) the establishment of a privately owned and managed accreditation bureau for such hardware and software, and to report to the President on an accelerated schedule. Research Questions: 1. Should some operations of some or all critical sectors be isolated from the Internet? If so, which ones? How should “isolation” be defined? What level of isolation would be appropriate for particular systems in critical applications? Who should determine that? 8 This is not a recommendation to create a single non-public energy network. Isolation from public networks does not imply isolation from efficient, digital operating systems that produce real-time, or near real-time, information about those systems. Non-public information and operating systems based on TCP/IP protocols are available or can be created. 9 FERC has jurisdiction over the interstate transmission of electric power. Power generation and delivery are regulated by the states and territories. 10 NERC is composed of the owners and operators of the grid and has been named by FERC as the “Electric Reliability Organization.” It is charged by Congress to “establish and enforce reliability standards for the bulk-power system,” subject to FERC’s oversight.
  • 14. MIT Center for International Studies 14 MIT Internet Policy Research Initiative 2. Can block chain or other technology be used to verify accounts in a timely fashion to reduce the risk of corrupted backup systems and wiped accounts? 3. What changes to security architectures would let us more efficiently manage system accesses and identities for devices, people, applications, and data, both internally and externally? 4. Can a system be designed so that its failure would be immediately transparent to its operator? Can the state of the system’s algorithms be made understandable to humans? Would it be cost-effective to impose audit requirements on that kind of system? (E.g., if a driverless car ran off a bridge, could its control algorithm be made to explain why it did that?) If so, why don’t we mandate that kind of auditability in critical sectors? 5. What economic, regulatory, or other factors impede the more rapid phasing out of legacy components of electronic systems in favor of components that are not merely newer but are demonstrably more secure? 6. What economic or other factors impede the adoption in the private sector of the existing but largely unused secure domain name system or an alternative security architecture? What incentives could accelerate the adoption of a more secure domain name system? 7. In the communications sector, what economic or other factors impede the adoption of secure border gateway protocols that would make it impossible, or substantially more difficult, to divert network traffic? What incentives could accelerate the adoption of that type of control? 8. Companies have differing interests. Academics make a living by disagreeing with one another and often prefer the notional perfect to the achievable good. Universal agreement on a domain name system and border gateway controls is therefore not achievable. Is there a point, short of war, when the Congress should make these choices? 9. The Internet of Things makes attack surface management geometrically more difficult. What aspects of insecure devices matter most in this respect? Should enhanced security be applied at the device level or only at higher levels within networks? 10. Would it be feasible and efficient in a virtual network to segregate or at least identify all executable code, thus making unauthorized executables more readily discoverable?
  • 15. MIT Center for International Studies 15 MIT Internet Policy Research Initiative SEVENTH CHALLENGE Formulate an effective deterrence strategy for the nation. Findings: The cybersecurity postures and capabilities of the United States and its peer or near-peer competitors in cyberspace have served to deter outright attacks against one another’s critical infrastructure, but have been unsuccessful in deterring lower-level but increasingly harmful cyber operations across our economy, society, and political system. Hostile acts are systematically carried out below the level of armed conflict that have the potential to gradually reduce this nation’s stature and security and its ability to lead free and open democracies around the globe. In this gray space between war and peace, the United States does not have an effective deterrence strategy against either nation-states or transnational groups bent on terror or other forms of disruption of our critical infrastructure. Recommendation: The President should direct his national security advisor to review the nation’s deterrence strategy. That strategy should include, but not be limited to, (i) hardening critical American systems and infrastructure; (ii) raising the price for attacking them; (iii) constructing a diplomatic strategy for achieving verifiable cybersecurity agreements with potential adversaries; and (iv) evaluating the nation’s ability in the long term to maintain offensive dominance in cyberspace and the stabilizing or destabilizing effect of attempting to do so. Research Questions: 1. In view of the demonstrated ability of certain nation-states to exploit critical networks for economic, political, and potentially military advantage, would a more directive policy toward hardening critical networks be justified? Would that course of action be politically acceptable in the United States and among other nations involved in global transactions and telecommunications? 2. Cyber network operations by capable nation-states and their proxies are difficult or impossible to prevent, yet we expect critical infrastructure operators to defend themselves against these attacks. Is this the right public policy? If not, what policy should replace it?
  • 16. MIT Center for International Studies 16 MIT Internet Policy Research Initiative 3. Will the pursuit of offensive dominance in cyberspace continue to be feasible in the next five to ten years? Will its pursuit be inconsistent with order and stability in cyberspace, as it proved to be in the strategic nuclear relationship with the Soviet Union? What are the implications of the answers to these questions for American diplomatic strategy in cyberspace? Is the President receiving robust counter-strike options, both military and non- military, for cyber intrusions, including those that do not rise to the level of armed conflict under international law? 4. Is any department of government conducting realistic simulations and other exercises to explore the consequences of non-military counter-strikes in response to a cyberattack? Does the President’s understand and approve of the assumptions that underlie these exercises? EIGHTH CHALLENGE Accelerate and improve the training of cybersecurity professionals. Findings: There is a serious dearth of cybersecurity expertise in the United States, especially at advanced levels. The nation does not produce enough graduates with advanced cybersecurity skills or with skills in both cybersecurity and in the operation of industrial operating systems. Recommendation: The President should appoint a blue-ribbon commission on the feasibility of increasing the supply of highly trained computer scientists and engineers and developing model curricula for training computer scientists and engineers in the defense of critical systems. The commission should report to the President within 180 days.
  • 17. MIT Center for International Studies 17 MIT Internet Policy Research Initiative This is a time for action. It is also a time for calm, long-term strategic thinking, based on sound research, into the underlying causes of cyber insecurity and how to address them. Research Questions: 1. Adm. Hyman Rickover created a rigorous model for selecting and training nuclear submariners. Should government or industry adopt his model for the cyber defense of critical infrastructure? 2. Can effective network defense skills be taught without also teaching high-level offensive skills? If not, given the risk of teaching those skills to a wider cadre, who should be eligible to receive that instruction? Should qualified trainers, in defined circumstances, be granted liability protection for teaching offensive tactics? 3. Are different core curricula appropriate to train people to operate and defend the networks of different critical infrastructures? If so, who should develop them? 4. Should people in cybersecurity disciplines be subject to specialized training and certifications, as in other professional disciplines? Background: The Persistent Problem In the United States, Presidential Directives to address infrastructure risk have emerged from the White House like clockwork for more than twenty-five years. In 1990, President George H.W. Bush announced to the country what intelligence officials, but not many others, already understood: “Telecommunications and information processing systems are highly susceptible to interception, unauthorized electronic access, and related forms of technical exploitation, as well as other dimensions of the foreign intelligence threat. . . . “ In 1998, as enterprises were beginning to shift both information systems and operations to the Internet, President Clinton warned of the insecurities created by cyber- based systems. In 1998 he directed that “no later than five years from today the United States shall have achieved and shall maintain the ability to protect the nation’s critical infrastructures from intentional acts that would significantly diminish” our security. Five years later would have been 2003.
  • 18. MIT Center for International Studies 18 MIT Internet Policy Research Initiative In 2003, President George W. Bush implicitly recognized that this goal had not been met. He stated that his cybersecurity objectives were to “[p]revent cyber attacks against America’s critical infrastructure; [r]educe national vulnerability to cyber attacks; and [m]inimize damage and recovery time from cyber attacks that do occur.” Meanwhile, virtually all commercial and operational activity was migrating to the Internet, which remained insecure. By 2009, concerns about critical infrastructure had become acute. President Obama said: The architecture of the Nation’s digital infrastructure, based largely on the Internet, is not secure or resilient. Without major advances in the security of these systems or significant change in how they are constructed or operated, it is doubtful that the United States can protect itself from the growing threat …. By 2013 – fifteen years after President Clinton had said the country’s critical infrastructure should be secure from malicious disruption by 2003 -- President Obama acknowledged that the goal had not been met: “The cyber threat to critical infrastructure continues to grow and represents one of the most serious national security challenges we must confront.” The view at the enterprise level is much the same. Trend Micro, a leading Internet security firm, reported in 2015 that critical infrastructure operators throughout the Western hemisphere “painted a picture that depicts the threat [to their networks] as being severe, while some perceived the future of securing these infrastructures as bleak.” The question the nation faces is therefore this: Are we condemned to remain in this unstable and insecure condition, in which the best we can do is to repeat urgent but futile warnings from high places and, at the operational level, merely to refine our tactics in a losing game of Whac-A-Mole? To find an answer, we gathered experts from industry, government, and academia, to imagine – in President Obama’s phrase – “a significant change in how [systems] are constructed or operated.” This meant going beyond the intense and difficult day-to-day tactical challenges that critical sector operators face, important as they are, to imagine a better security environment in five to ten years and to understand what keeps us from getting there. Expanding Operational Risk For the owners and operators of critical infrastructure, the prime concern is risk to continuity of operations rather than theft of information, though that, too, is a serious risk. An intruder who can steal massive amounts of data from a system remotely can also corrupt the information on the system, or wipe information from it, or shut it down.
  • 19. MIT Center for International Studies 19 MIT Internet Policy Research Initiative Information technology and industrial operating technology have largely converged. A decade ago, researchers at the Idaho National Laboratory proved they could physically destroy a diesel-electric generator using only a keyboard and a mouse.11 Real-world examples soon followed. In 2010, the centrifuges used to enrich uranium gas at Iran’s Natanz nuclear facility started failing rapidly. The Iranians were baffled – until researchers in Germany diagnosed the Stuxnet virus, now widely attributed to the intelligence services of the United States and Israel.12 In 2012, cyber attacks from Iran wiped all information from thirty thousand computers at the world’s largest oil refiner, Saudi Aramco.13 In 2014, an unidentified intruder used a spear-phishing ruse to gain access to the network of a German steel mill, then caused multiple components of the industrial control system to fail, resulting in massive physical damage.14 Meanwhile, starting in 2011, a Russian operation known as “Dragonfly/Energetic Bear” began targeting North American aviation companies before shifting to U.S. and European energy firms. Its targets included “energy grid operators, major electricity generation firms, petroleum pipeline operators, and Energy industry industrial control system (ICS) equipment manufacturers. Most of the victims were in the United States, Spain, France, Italy, Germany, Turkey, and Poland.”15 There were no reports of damage from these penetrations; they appeared to be reconnoitering exercises that could facilitate damaging attacks on the systems later, if the intruder chose to attack. In 2015 the prospect that an attacker might launch a damaging attack on an adversary’s energy grid became reality when portions of Ukraine’s power grid were disabled for several hours in a coordinated attack on three energy firms. This was the first publicly acknowledged attack on a power grid. The Ukraine government immediately blamed Russia. The attackers employed a range of sophisticated tools, but in the view of several analysts, “the strongest capability of the attackers was not in their choice of tools or in their expertise, but in their capability to perform long-term reconnaissance operations required to learn the environment and execute a highly synchronized, multistage, multisite attack.”16 11 “The experiment used a computer program to rapidly open and close a diesel generator's circuit breakers out of phase from the rest of the grid and cause it to explode.” Wikipedia, “Aurora Generator Test,” at https://en.wikipedia.org/wiki/Aurora_Generator_Test, accessed January 6, 2017. 12 Wikipedia, “Stuxnet,” at https://en.wikipedia.org/wiki/Stuxnet, accessed November 16, 2016. 13 Nicole Perlroth, “In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back,” New York Times, October 23, 2012, at http://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm- disquiets-us.html, accessed December 23, 2016. 14 R.M. Lee et al., “German Steel Mill Attack,” SANS Institute, ICS Defense Use Case, December 30, 2014, at https://ics.sans.org/media/ICS-CPPE-case-Study-2-German-Steelworks_Facility.pdf, accessed December 23, 2016. 15 June 30, 2014, at https://www.symantec.com/connect/blogs/dragonfly-western-energy-companies- under-sabotage-threat, accessed December 6, 2016. 16 Lee et al., “Analysis of the Cyberattck on the Ukrainian Power Grid,” SANS Institute, ICS Defense Use Case, March 18, 2016, at http://www.nerc.com/pa/CI/ESISAC/Documents/E- ISAC_SANS_Ukraine_DUC_18Mar2016.pdf, accessed December 23, 2016.
  • 20. MIT Center for International Studies 20 MIT Internet Policy Research Initiative This is the offense-dominant environment that critical infrastructure operators now live in. Network defense has certainly gotten better in the last fifteen years in absolute terms, but so has the offense. Relative to the increased resources and sophistication of criminal and nation-state attackers, it is doubtful the defense has improved at all. Attacks are still easy and cheap to launch and difficult and expensive to defend against. The offense continues to enjoy inherent advantages owing to human fallibility, architectural flaws in the Internet and the devices connected to it, massive data aggregation, and pervasive interconnectivity. And the attacker must succeed only once, while the defense must succeed thousands or millions of times. Connecting geographically dispersed operating equipment to the Internet has brought undoubted efficiencies to electricity generators and other industries, but it has also created dangerous vulnerabilities in the systems that keep the lights on and power the economy. In late 2016, the recently retired chief security officer of AT&T said it was “inevitable that significant, large-scale cyber attacks will be launched against our critical infrastructure [in the coming four years]. These attacks will shift from the theft of intellectual property to destructive attacks aimed at disrupting our ability to live as free American citizens. I do not know of a single cyber security expert in our country who would disagree with this view.”17 We concur. Why Are Systems Insecure? When the Internet was being designed in the early 1970s, it was not initially clear what the important security issues were. Its initial purposes were to assure communications in the event of a nuclear attack through packet-switched routing, and then to serve as the basis for collaboration among geographically dispersed scientists working for the Department of Defense. The relatively few people having access to the original network were a trusted group for whom security was not an issue. Insofar as the network’s sponsors in the Department of Defense and the intelligence community thought about security, they preferred that security challenges be pushed onto the attached end-nodes, without appreciating the difficulty of doing so. The Internet’s designers understood that many security problems would best be addressed through encryption, but encryption was not a commercially practical technology at the time for reasons of performance and lack of open standards. At the time, encryption was also regulated as a munition for export purposes. These considerations, together with the imperative to get the Internet to work at all, led to several classes of security problems. In particular: 17 Edward Amoroso, “An Open Letter to the President-Elect on Cyber Security,” LinkedIn, November 25, 2016, at https://www.linkedin.com/pulse/open-letter-president-elect-cyber-security-edward- amoroso, accessed December 10, 2016.
  • 21. MIT Center for International Studies 21 MIT Internet Policy Research Initiative 1. Several of the core control protocols and supporting services of the Internet were designed without an approach to security, and adding security after the fact has proved more difficult than anticipated. These protocols include the global, inter- domain routing protocol (Border Gateway Protocol or BGP), the Domain Name System (DNS),18 and the Certificate Authority system. In all these cases, secure alternatives have been proposed but have not been taken up in the marketplace. What the original designers thought would be a technical challenge has turned out in all cases to be a challenge created by misaligned economic incentives, poor coordination and leadership, a lack of global trust among stakeholders, and disagreements about what the security problems are. 2. Strictly speaking, the Internet is simply the network that connects end-points using a technical protocol called “TCP/IP.”19 It was never meant to police itself for criminal or offensive behavior. To a significant degree, therefore, the Internet is doing what it was designed to do: that is, to connect end-points. Many (perhaps most) of the vulnerabilities in our systems occur at other levels – in hardware designed with little or no consideration for basic security, for example;20 in carelessly written software;21 and in applications created for quick market penetration that are unable to meet reasonable security requirements.22 In the early days of the Internet’s development, the designers paid relatively little attention to the challenge of developing secure applications, since in their view they had no control over what application designers could do. Most application designers today are motivated by features, time to market, and return on investment. These priorities align poorly with security. This set of actors is highly diverse, unregulated, transnational, and sometimes hard to find, and it is not clear what approach could be used to nudge them to attend more to security. 18 “Domain Name System,” Wikipedia, at https://en.wikipedia.org/wiki/Domain_Name_System, accessed December 12, 2016. 19 For definitions of the Internet and TCP/IP protocols, see respectively Wikipedia at “Internet,” https://en.wikipedia.org/wiki/Internet, and “Internet Protocol Suite,” https://en.wikipedia.org/wiki/Internet_protocol_suite, both accessed January 7, 2017. 20 For the IoT attack on an important Internet company, see Schneier on Security blog, “Lessons from the Dynamics’s DDoS Attack,” https://www.schneier.com/blog/archives/2016/11/lessons_from_th_5.html; James Scott and Drew Spaniel, Rise of the Machines: The Dynamics’s Attack Was Just a Practice Run, December 2016, Institute for Critical Infrastructure Technology report, at http://icitech.org/wp- content/uploads/2016/12/ICIT-Brief-Rise-of-the-Machines.pdf, accessed January 8, 2017. 21 See, e.g., Wikipedia, “Buffer Overflows,” at https://en.wikipedia.org/wiki/Buffer_overflow, accessed January 3, 2017. Buffer overflows have been known to be a security vulnerability for years. 22 See, e.g., Lucian Constantin, “App Developers Not Ready for Stricter IoS Security Requirements,” Computerworld, December 6, 2016, at www.computerworld.com/article/3147373/security/app- developers-not-ready-for-stricter-ios-security-requirements.html, accessed December 7, 2016.
  • 22. MIT Center for International Studies 22 MIT Internet Policy Research Initiative 3. There is no agreement today on who, if anyone, should be responsible for making the Internet ecosystem more secure. For example, it can be extremely difficult, even impossible, to be certain who you are communicating with on the Internet. Identities can be easily spoofed and websites counterfeited, enabling fraud. But which actors in the Internet ecosystem should undertake to fix this? Should the packet-forwarding layer of the Internet attempt to impose a single, global identity scheme that applies to all applications? Doing so would raise yet again the question of global trust and coordination. It would make anonymous action very difficult. That would reduce crime, but it would also enhance surveillance powers and thereby threaten privacy. Should the large and uncoordinated community of application designers be told that identity assurance is their problem? In fact, the solution probably requires support at all layers. But there is no institutional forum in which an allocation of responsibility can be resolved. 4. Data files, which are passive, and executable files, which perform operations on data, cannot be distinguished as they are transmitted across the Internet. But this approach left the discrimination between data and executable files to the application designers in the end-nodes, who were often indifferent to the issue. As a result, malicious executables are easily disguised among large quantities of data. They are easy to insert and extremely difficult to find in a large database or system. This problem became much more difficult once data files (e.g., a Word file) were designed to embed executable code (e.g., macros). After Congress made the Internet generally available for commercial use in 1992, the network became the backbone of our entire system of economic and social communication, and increasingly of our physical operations, so these inherent weaknesses assumed enormous significance. As Richard Danzig has noted, “Cyber systems create serious security problems because they concentrate information and control and because the complexity, communicative power and interactive capabilities that enable them unavoidably create vulnerabilities.”23 Putting massive amounts of information in one place, which is highly efficient, also facilitates massively efficient theft. And connecting almost everything to almost everything else, which is also efficient, means that a vulnerability in any part of the interconnected system is a vulnerability in every part of it. These factors, together with the difficulty of tracing and attributing attacks, make the Internet a prime environment for criminals. 23 Richard Danzig, “Surviving on a Diet of Poisoned Fruit: Reducing the National Security Risks of America’s Cyber Dependencies,” Center for a New American Security (July 2014), p. 9, at https://www.cnas.org/publications/reports/surviving-on-a-diet-of-poisoned-fruit-reducing-the- national-security-risks-of-americas-cyber-dependencies, accessed December 24, 2016.
  • 23. MIT Center for International Studies 23 MIT Internet Policy Research Initiative It is a serious error to assume that cybersecurity is entirely a matter of technical specifications and system design. Poor business management, lack of clear responsibility within organizations, and bad user behavior would continue to create significant vulnerabilities even if the technical issues could suddenly be fixed. Last year, when for the first time the Bank of England included cybersecurity as a major risk factor for the financial stability of the United Kingdom, its number one finding was, “Overemphasis on technological (as opposed to management, behavioural and cultural) aspects weakens cyber defensive capabilities.”24 We concur. A common human error enabling fraud is susceptibility to an online scam known as phishing. Phishing involves sending a mass email that appears to come from a trusted source such as a bank or a well-known company, but does not. A recipient (the “phish”) who opens the email and clicks on the attachment unwittingly downloads malware. The purpose of the malware varies. It may steal information such as passwords or credentials, or it may enlist the recipient’s machine in a campaign to advertise pornography, drugs, etc. Phishing campaigns are nearly cost-free to conduct and are highly successful. According to Verizon, thirty percent of recipients open phishing emails, and about a third of them click on the attachment. “The median time for the first user of a phishing campaign to open the malicious email [was] 1 minute, 40 seconds. The median time to the first click on the attachment was 3 minutes, 45 seconds ….”25 Spear phishing is a socially engineered fraud aimed at a specific person, often a corporate or government official. This is a favorite tactic of sophisticated criminal gangs and intelligence services, which can craft an email that appears to come from a trusted person on a topic that the recipient is known to be interested in. Sometimes the malware is automatically downloaded merely by opening the email. In a recent survey by Trend Micro, “spear-phishing tactics were cited by all responding members as the single biggest attack method they had to defend against, with the exploitation of unpatched vendor software vulnerabilities being a distant second.” Whether an effective technological defense to this vulnerability can be deployed remains to be seen. Weaknesses in the email system also contribute to identity spoofing. The basic design of email is older than the Internet; it existed in the late 1960s in an earlier internal Defense Department network called ARPAnet. There seemed to be little need in those days to build an authenticated identity system to validate the sender of an email on a closed system involving trusted parties. Since that time, there have been proposals put forward to secure email by having the sender sign the mail in a trustworthy manner, but those proposals achieved little market traction owing to lack of market demand, 24 Bank of England, “Financial Stability Report,” July 2015, Table A.10, p. 32, at http://www.bankofengland.co.uk/publications/Documents/fsr/2015/fsrfull1507.pdf, accessed January 6, 2017. 25 Verizon, “2016 Data Breach Investigations Report,” p. 18, available at http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/, accessed December 24, 2016.
  • 24. MIT Center for International Studies 24 MIT Internet Policy Research Initiative engineering complexity, development costs, disagreements about the correct approach, the lack of an institution that could exercise acceptable global leadership, and so on. There would also be little if any market advantage to incurring these costs if others failed to follow. These issues are not technical. The vulnerabilities at all levels of the cyber environment have been well known for years, yet many firms fail to take basic security precautions. And it is still the case that a large majority of intrusions are discovered by law enforcement and other third parties and not by the enterprise that owns the network.26 Even among owners and operators of critical infrastructure, decisions to expose their operations to these vulnerabilities have repeatedly been made with little or no regard for the risks thus imposed on the enterprise, let alone the risks imposed across the entire economy. Enterprises that expose their operations to the Internet must accept Internet services as they find them, replete with vulnerabilities, and protect themselves accordingly. Insofar as those enterprises are regulated, the cost of doing so should be reflected in the rates they are permitted to charge. In short, profound network insecurity has persisted for twenty-five years for many reasons. A problem this enduring in so fundamental an area demands concerted attention. It also calls for concentrating resources devoted to research and development efforts (R&D) into technologies and policies to make attacks more difficult and expensive to launch and less difficult and expensive to combat. Coordinating Research Policy There has been no shortage in recent years of federal pleas for research into critical infrastructure cybersecurity, but they have tended to remain general and hortatory. In 2009, for example, the Department of Homeland Security (DHS) published “A Roadmap for Cybersecurity Research” that identified an important problem set but did not develop a research agenda to deal with it. In 2011, the National Science and Technology Council (NSTC) articulated the need for federal spending in basic cybersecurity research but was content to describe challenge areas (e.g., mobile security, creation of trusted spaces, etc.) rather than specific areas for research. In 2013 a presidential policy directive emphasized that research was a critical aspect of achieving critical infrastructure security and resilience27 but was not specific. In 26 Verizon, 2016 DBIR, p. 11, fig. 9. 27 Resilience is the ability to operate at an acceptable, if suboptimal, level of performance in the face of attack or failure. For a thoughtful exploration of this concept, see Harriet Goldman, “Building Secure, Resilient Architectures for Cyber Mission Assurance,” Case 10-3301, MITRE Corp., 2010, at https://pdfs.semanticscholar.org/911a/9c301359a0bcbdc3e49b2f7a04cf7eef14b2.pdf, accessed January 5, 2017.
  • 25. MIT Center for International Studies 25 MIT Internet Policy Research Initiative June 2014, a subcommittee of the NSTC issued a cogent statement of federal cybersecurity research objectives, but did not identify a path to get there. Last year DHS brought additional attention to the challenge with its R&D plan for research in this area, but the plan did not go beyond a general statement of objectives. Reports and directives from high levels of government are inevitably general, but lack of follow-through and inattention to detail are not inevitable. At the agency level, specific but uncoordinated research projects are underway to tackle technical cybersecurity problems. For example, at the Defense Advanced Research Project Agency (DARPA) a project on Organically Assured and Survivable Information Systems (OASIS) focuses on increasing fault tolerance in systems and networks. But these programs are not coordinated, and many of the general problems described in high-level government documents remain insufficiently addressed, if addressed at all. Against this background, the nation must devote substantial coordinated resources (1) to identify the most salient risks to critical infrastructure networks, and (2) to describe specific cybersecurity objectives that could reduce those risks and that could be broken into manageable research projects. This is what IPRI and CIS have sought to do. The Workshop Plan IPRI and CIS convened four sector-specific workshops to study the challenge of a coordinated research and policy plan, and later a fifth workshop to distill what we learned from the first four. It was clear from the start that “critical infrastructure” had become too broad a rubric to guide our work. In the United States, the term means “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.”28 Sixteen sectors have now been designated “critical.” We therefore selected four sectors we deemed most critical,29 and scheduled the following day-long workshops, all held in Cambridge, Massachusetts at MIT: ● Electricity October 8, 2015 ● Finance November 5, 2015 ● Communications December 3, 2015 ● Oil and Natural Gas (ONG) February 8, 2016 ● Final Workshop May 2, 2016 28 42 U.S.C. § 5195c (e). 29 Time constraints precluded an additional workshop on the transportation sector.
  • 26. MIT Center for International Studies 26 MIT Internet Policy Research Initiative Participants came from key industry firms in the United States, Canada, Japan, and Europe; from pertinent government offices, from MIT, and from Carnegie-Mellon University. Most of the MIT participants and several of the industry and government participants attended all the workshops. We limited attendance to twenty people at each workshop and did not ask for prepared presentations. Instead we asked participants to do three things: 1. Describe their most severe challenges in terms of systemic issues; 2. Describe the characteristics of a more secure environment for IT and the OT linked to it; and 3. Identify the technical, political, and economic impediments to achieving those characteristics. Each workshop took on a dynamic of its own. We asked questions but did not limit the topics of discussion. Not surprisingly, some industry participants had difficulty framing questions in strategic terms, while some academic participants had difficulty framing theoretical questions that were relevant to the concerns of the industry participants. Yet each workshop produced spontaneous, lively discussions that served to frame and sharpen issues. Although we asked participants to address the three questions just stated, the output of each workshop fell into a simpler dyad: a consensus list of the greatest risks to the sector, and a consensus list of most important challenges for the sector. Except for certain regulatory issues, every major challenge was discussed in every workshop. If a challenge appears in the account of one workshop but not another, that is because it received the most emphasis in that workshop. To create a research agenda, we convened a fifth workshop of twenty participants selected from the previous workshops and presented them with a distillation of ideas from the previous sessions. We asked them to identify the most critical challenges across all sectors and to turn those challenges into questions amenable to research. The outcome of that workshop formed the basis of the IRPI-CIS statement of the seven high- level challenges and the related recommendations and research questions in this report.
  • 27. MIT Center for International Studies 27 MIT Internet Policy Research Initiative The Sector-Specific Workshops 1. Electricity Sector Workshop Electricity sits at the base of any modern society’s operational structure. Nearly all economic and social activity depends on it. Not surprisingly, the risk most feared in this workshop, even more than loss of information, was disruption of service. The electricity sector operates in a unique and complex regulatory environment and displays striking internal differences, especially between the larger firms and the smaller enterprises and cooperatives. Electricity transmission in the United States30 is governed by federal law, but delivery is regulated by the fifty states and the territories in inconsistent ways. As a general matter, regulated entities are entitled to a specified rate of return on expenditures allowed into their rate base, as determined by their regulator. They therefore have an incentive to make expenditures allowable into that base. According to our industry participants, state regulation has historically been consistent in its emphasis on rate regulation, which is a politically sensitive topic, and on safety. Expenditures calculated to lower rates (such as software designed to create efficiencies) or to improve safety are favored, they said. In contrast, network security has not been a regulatory focus, and some participants asserted that capital expenditures necessary to defend digital systems are more difficult candidates for regulatory approval. Because of the asserted difficulty of assigning a return on investments in network security, such expenditures were also more difficult candidates for corporate approval, according to these participants. These statements should be verified because, if true, these factors, together with the long lifespan of much of the sector’s OT, would impede the adoption of needed security measures. The Most Severe Risks Risk 1: Risk from aging operating systems retrofitted with digital controls. Most participants believed the most important risk factor for their sector was the networking of aging valves, pumps, and other hardware that were designed to be physically isolated and locked up, but which are now accessible remotely. Many of these operating components were twenty or more years old. They now form parts of systems that were retrofitted (“cobbled together”) to be electronically accessible through acquisition programs that failed to take the resulting vulnerabilities into account. A participant compared the state of the industry to the Office of Personnel Management, which had digitized old systems without understanding the vulnerabilities thus created. 30 The U.S. electric grid is better described as being part of the North American electric grid. There are many dependencies at the grid level between the U.S. and Canada.
  • 28. MIT Center for International Studies 28 MIT Internet Policy Research Initiative Participants also stated that no one fully understood the extent to which the electricity industry is tightly coupled with other sectors, and therefore did not sufficiently understand the risk of catastrophic, macroeconomic failure. There was support for the view that the Department of Energy should be more concerned about disruptions lasting longer than two to three weeks. Risk 2: Risk from third-party access. One participant identified his company’s chief risk as unauthorized external access to networks and systems owing to the extension of access privileges to third parties, mostly vendors and other contractors. All agreed this was a significant risk factor. Some doubted whether meaningful network perimeters still exist. In some cases, companies required dual-factor identification and the use of a VPN to engage in remote maintenance, but if the threat arose in a trusted vendor’s system, as some thought likely, those steps did not help. Data centers and the increasingly ubiquitous Internet of Things (“IoT”) also created third-party risk. The IoT created an attack surface that was huge and expanding dramatically, and many of the connected devices related to energy consumption and had little or no security designed into them. If attacked, these devices could cause localized failure and be used to steal customer information. They could also be organized into botnets to attack any sector of the economy. That observation has since been borne out.31 Risk 3: Risk Created by Regulatory Emphasis on Compliance versus Security. Participants stated there was a confusion among many executives and regulators about the difference between compliance with published standards and adequate security. That confusion is not restricted to this sector. In contrast, no such confusion exists among security professionals, who understand that compliance certifications are a necessary condition of doing business but insufficient because they do not adequately address constantly changing risks. Some participants also stated that the basic compliance standard issued by the North American Electric Reliability Corporation, known as the “NERC CIP,” compared unfavorably to standards issued by the Payment Card Industry. Compliance is check-list oriented and gives a false impression of security. Participants also emphasized cultural factors, noting that the oil-and-gas sector’s concerted emphasis on physical safety may be a model for an emphasis on security. 31 David E. Sanger and Nicole Perlroth, “A New Era of Internet Attacks Powered by Everyday Devices ,” New York Times, October 22, 2016, at http://www.nytimes.com/2016/10/23/us/politics/a-new-era-of- internet-attacks-powered-by-everyday-devices.html?_r=0, accessed October 25, 2016.
  • 29. MIT Center for International Studies 29 MIT Internet Policy Research Initiative The Challenges The electricity workshop identified high-level security objectives supported, in most cases, by more detailed objectives necessary to achieve them. Most of the identified challenges were economic, commercial, and legal rather than technical. In nearly all cases, however, meeting the objectives would require a substantial effort simply to gather the data necessary for high-quality analytics. Obtaining the necessary data in ways that did not create additional risk for the data provider would itself be a significant challenge. Challenge 1: Quantifying risk at the enterprise, sectoral, and macroeconomic levels. There was general agreement that quantifying risk was both difficult and necessary. As one participant stated, a dollar spent on “vegetation management” (trimming trees) was more valuable to his company’s board than a dollar spent on cybersecurity, because its effect could be measured, whereas network risk could not. Participants also stated that baselining risk – that is, describing the current state of a network – was difficult but necessary to quantify risk. One participant stated that many utilities do not even own their own data, which would be required for risk analysis, intelligence gathering,32 and prediction. Challenge 2: Measuring and reducing intra-sector and cross-sector fragilities through simulation-based, cross-sector exercises. These fragilities were insufficiently understood. There are about 3000 utilities in the United States, but seven utility holding companies serve about 70% of U.S. customers.33 The level of operating and security sophistication in the market was not uniform. More attention should be paid to IT/OT inter-connection risk across this disparate market and to coordinating defenses. There was general agreement that the electricity sector lagged the financial sector in this regard, and that sectors were tightly coupled. Participants did not believe the country could detect a series of rolling, low-level events that could precipitate a crisis. Participants broke this challenge into three parts: a. Compile the data required for quality simulations. Exercises between the electric and the financial sectors could yield major security gains, participants believed. Various exercises coordinated by the Treasury Department and the Financial 32 The U.S. Department of Energy (DoE) has spearheaded an effort called the Cybersecurity Risk Information Sharing Program, or CRISP, to share classified as well as unclassified information in this sector. See letter of Patricia Hoffman, Assistant Secretary, DoE Office of Electricity Delivery and Energy Reliability to Tom Fanning and Fred Gorbet, August 5, 2014, at http://www.nerc.com/pa/CI/Resources/Documents/Department%20of%20Energy%20Letter%20- %20Cybersecurity%20Risk%20Information%20Sharing%20Program%20(CRISP).pdf, accessed January 6, 2017. 33 Information courtesy of the Edison Electric Institute.
  • 30. MIT Center for International Studies 30 MIT Internet Policy Research Initiative Services Sector Coordinating Council were a good model.34 But simulations require large quantities of good data, which firms have been reluctant to share. Utilities measure success based on reliability, safety, low costs, and consumer satisfaction. What data would induce companies to add network security to this list?35 b. Secure the participation of state, local, and federal governments in cross-sector simulation exercises. A series of disaster exercises called Gridex now exists, but it is limited to public-sector stakeholders. In the next scheduled exercises, planned for the autumn of 2017, “participation is open only to registered utilities and others specifically invited by the utility (e.g., vendors, local law enforcement).”36 Additional exercises should broaden participation in the public and private sectors. c. In a collaboration between MIT and industry, develop realistic scenarios for simulation exercises. Challenge 3: Creating a model for a rational regulatory scheme that would align investment and security requirements with risk. Many participants stated that prevailing regulatory regimes create intense pressure to adopt software technology without any pressure to secure it. The following specific steps toward creating a better model were proposed: a. Perform a comparative analysis of state regulation of electric utilities in Massachusetts, Rhode Island, and New York. An industry participant with experience in these jurisdictions stated that studying their differences would be enlightening. b. Compare data integrity measures in the electric and financial sectors. The financial sector was said to be intensely concerned with data integrity and was more advanced than this sector in securing it. 34 See, e.g., Sean Waterman, “Bank regulators briefed on Treasury-led cyber drill,” FedScoop, July 20, 2016, at http://fedscoop.com/us-treasury-cybersecurity-drill-july-2016, accessed November 8, 2016; U.S. Department of Treasury, “Joint Statement from the U.S. Department of The Treasury and Her Majesty’s Treasury,” November 12, 2015, at https://www.treasury.gov/press-center/press- releases/Pages/jl0262.aspx, accessed November 8, 2016. 35 A participant noted that the automobile industry had created massive cyber vulnerabilities in vehicles, but that the industry is fixing them now because the potential liabilities could be very large. Regulated utilities were said not to face a comparable risk. 36 NERC, “GRIDEX IV Frequently Asked Questions,” p. 1, December 2, 2016, available at http://www.nerc.com/pa/CI/CIPOutreach/Pages/GridEX.aspx, accessed January 5, 2017.
  • 31. MIT Center for International Studies 31 MIT Internet Policy Research Initiative c. Study nuclear regulation as a potential model for the regulation of non-nuclear electricity. A participant stated that the nuclear industry went from a prescriptive to a performance-based regulatory regime, recognizing that technologies were advancing more quickly than regulation could keep up. d. Optimize legal, regulatory, and tax, policy for security investment to maximize investment incentives and place costs where they can be reflected in the price of the goods and services produced. Existing regulatory schemes and tax policy did not do this, according to participants. There was broad but not unanimous support for the view that liability should play a greater role in driving better network security, and that now it plays almost none. Challenge 4: Supporting a market for simpler, less vulnerable technology. The widespread use of field-programmable gate arrays37 and multi-purpose controls were cases in point. Both were cheaper to produce than special-purpose devices and were highly capable – but were therefore more vulnerable. Creating a market for limited-purpose devices was seen as more of a political and economic challenge than a technical one. In this regard, some participants wanted to explore the use of analog devices within, or alongside digital systems, especially at end points. Challenge 5: Improving human expertise in network management. a. Identify the skill sets uniquely required in this sector and expand the talent pool. There are not enough qualified operating engineers and computer scientists who understand the challenges unique to the electricity sector. b. Investigate the “Rickover Model” for the training and selection of navy personnel for the nuclear submarine service. When the U.S. Navy created a nuclear submarine service, Admiral Hyman Rickover required applicants to complete a rigorous training regimen for admission to the service. Could that model be adapted for security professionals in this or other sectors? 37 “A field-programmable gate array (FPGA) is an integrated circuit designed to be configured by a customer or a designer after manufacturing …. FPGAs contain an array of programmable logic blocks, and a hierarchy of reconfigurable interconnects that allow the blocks to be "wired together", like many logic gates that can be inter-wired in different configurations.” “Field-programmable Gate Arrays,” Wikipedia, at https://en.wikipedia.org/wiki/Field-programmable_gate_array, accessed December 12, 2016.
  • 32. MIT Center for International Studies 32 MIT Internet Policy Research Initiative Challenge 6: Integrating the Management of IT and OT. Each utility is different in the way it integrates, or fails to integrate, the management of operating technology (OT) and information technology (IT). Some do not converge until the corporate level; others converge much lower down. No one believed a single governance model would be useful, but the group did believe that IT and OT have substantially converged – at any rate, they have converged sufficiently so that operating systems can now be attacked through IT systems. Management structures should reflect that fact. a. Unify security functions. In the view of many participants, someone in the enterprise should have a view of the full scope of security threat, from wherever they came. The group did not agree on that person’s proper title and reporting responsibilities, but did agree that he or she should report to an officer of the company and possibly to the board. b. Optimize OT/IT replacement cycles, which are out of synch. OT in this sector has historically been on replacement cycles of 15-25 years. In contrast, IT measures technology generations in 3-5 years. These cycles should be studied and optimized.
  • 33. MIT Center for International Studies 33 MIT Internet Policy Research Initiative 2. Financial Sector Workshop The finance workshop identified three risks that were unique or especially severe in the sector: 1. Data integrity risk; 2. Systemic risk to the financial system that may not be apparent when considering enterprises or the sector in isolation; and 3. Third-party risk arising from the inability to alter long-term contractual arrangements with other market participants. The financial sector also shares risks common to critical infrastructure, though it has the most advanced network defenses of any sector. The Most Severe Risks Risk 1: Data Integrity. Risk to the integrity of financial data topped the list of our participants’ concerns. Our economy is based on a system of accounts recording who owes what to whom at any moment. Those accounts are digitized, and so are back-up systems. An attack that destroyed or corrupted the accounts of a major financial institution could wreak devastating economic havoc unless those accounts could be quickly and reliably reconstituted. The risk extends beyond banks to securities exchanges, brokerage firms, investment companies, clearing organizations, and other financial enterprises. A sophisticated network attack could lock-up this sector. A logic bomb, for example, could randomly delete system files. According to one participant, that has already occurred, and it took time to understand what had happened and to fix it. But disruption is only one risk that could arise form from data loss or corruption. A subtle, more limited operation that corrupted the pricing of selected securities, for example, could be used to manipulate markets, create illegal profits and losses, and drive parties out of business. Participants agreed that a slowly rolling attack on an institution might create more havoc than an attack that brought the institution to an immediate halt, for which the larger institutions prepare. A “low and slow” corruption of accounts would be difficult to spot, and unless it were stopped quickly, it would infect back-up systems, too. The longer it lasted, the more backup accounts would also be infected. Research that addressed this risk would be of great value.
  • 34. MIT Center for International Studies 34 MIT Internet Policy Research Initiative Risk 2: Systemic Risk from Tight Coupling Within and Across Sectors. Participants were concerned about the cross-sector risk created by the tight coupling of finance, energy, and telecommunications, but they were also concerned about risk from tight coupling within their sector. Several participants agreed that financial enterprises assume that in this space all parties are managing their own risks and that systemic risk is therefore also being managed through the sector, but they doubted this is true. Notwithstanding the perception that the level of cooperation in this sector is high, these participants believed it was insufficient and that more collective action on information sharing would be required to better protect the sector from attack. The nuclear power industry was cited as an example. In that sector there was widespread understanding that an adverse incident that affected any of them would adversely affect them all. The financial sector was said not to be at that point. In particular, several participants complained of poor network security among competing institutions (“shirking”). They gave two examples: (1) competitors that sought market advantage by saving money on network security, and (2) community banks that lacked the financial and other resources to make themselves reasonably secure. As to the latter, participants noted that the share of assets controlled by community banks continues to fall, so some questioned the significance of this risk. Others noted that imposing further regulation on these banks would accelerate consolidation in the banking sector. However, that risk was not equally troubling to everyone present. A participant noted that shirking was merely one aspect of the more general problem of consistent standards. As institutions other than banks and SEC-regulated businesses became larger players, the problem of inconsistent regulation would present a growing problem. Several participants stressed that one should pay close attention to the application of regulatory standards as well as to their content when assessing consistency. Risk 3: Contractual Risk from Long-Term Third-Party Contracts. Long-term contracts with other institutions (which some participants called “locked handshakes”) were a special example of risky intra-sector coupling. The example given involved payment processors, which allegedly employ hard, pre-set passwords that are not regularly rotated, if rotated at all. That kind of arrangement was said to lock in network access rights of third-parties with allegedly poor security. These contracts were said to allocate risk in ways that participants believed were unfair and that were not foreseen when the contracts were made. These contracts can have terms of twenty years, and many were made before the sector fully came to grips with network risk. These assertions should be tested empirically. However, industry participants believed this risk was real, that the sector needed a means to force the renegotiation of these contracts, and that quantifying the problem would be helpful. We detected a willingness among several industry participants to favor a regulatory solution to this issue, and one of them specifically suggested that the issue could be of interest to the Federal Trade Commission
  • 35. MIT Center for International Studies 35 MIT Internet Policy Research Initiative (which has recently used Section 5 of the FTC Act38 to address unfair as well as misleading practices affecting network security). Another suggested that clearing agencies might be able to provide leverage for achieving higher security levels. In evaluating these contentions, attention must be paid to the competitive interests involved as well as to the alleged security risks. Risk 4: Difficulty of Identifying Malicious Actors. The difficulty of attributing behavior to malicious actors is an aspect of the identity management problem common to every sector, but our participants stressed the challenge of ascertaining internal as opposed to external identities. And they were concerned with controlling administrative privileges because most hacks they dealt with involved abuse of administrator access. Some participants said that machines also have identities and privileges, and that managing identities was easier for people than for machines. Several participants stated, without dissent, that “operator risk” – that is, insider threat from malicious or simply negligent behavior – was a medium, not a low, probability. Some participants agreed that the government’s unsuccessful efforts regarding trusted identities illustrated the difficulty of accomplishing anything comprehensive in this space. The Challenges Challenge 1: Enhancing the integrity of backup systems. A slowly evolving attack could be a bigger threat to financial institutions than an attack aimed at a sudden network collapse because it would not be discovered as quickly – and possibly not until backup systems had been infected. Participants were particularly interested in the possible applicability of blockchain technology to their systems and the status of blockchain research to the latency problem (that is, the time required to complete a communication or transaction). Some participant firms are investing in blockchain research. 38 15 U.S.C. §§ 41-58, as amended. The Commission is a consumer protection agency, not a financial regulator. It considers three factors in determining whether a practice violates the prohibition on unfair consumer practices: (1) whether the practice injures consumers; (2) whether it violates established public policy; (3) whether it is unethical or unscrupulous.” FTC, “FTC Policy Statement on Unfairness,” December 17, 1980, accessed November 16, 2016.
  • 36. MIT Center for International Studies 36 MIT Internet Policy Research Initiative Challenge 2: Identifying and reducing cross-sector risk through joint cross-sector exercises. Robust joint exercises using sophisticated data would help illuminate the risk from the tight coupling of power, finance, and telecommunications. These exercises would elucidate intra-sector and cross-sector vulnerabilities and would benefit all participating sectors. They would also highlight sectoral differences about the priorities given to availability, integrity, confidentiality – another area for potential research. Challenge 3: Improving identity management consistent with privacy concerns. a. Among Communicants The tension between privacy and identity management among communicants concerned many participants, but there was widespread agreement that it is important to focus on the specific information fields that would be most useful, and then to determine whether and how that data can be shared consistent with EU and US law. Several participants asserted that EU law made it more difficult to identify both malware and malicious actors in their systems. A non-industry participant stated that banks and credit card companies are not using in their own networks the kinds of data-driven identity management/risk flagging techniques they employ to monitor credit risk. It would be useful to know whether, why, and to what extent this may be true. b. Among Providers It is technically simple to divert large amounts of traffic when it is “handed off” from one service provider to another. This has occurred several times. These hand-offs occur at border gateways, following border gateway protocols (BGP). These protocols are weak, which is to say that identity assurance39 is weak at the BGP level as well as at the level of individual communications. Traffic diversion could cripple communications, and although it would be quickly discovered and repaired, the delay in a crisis could be critical. A more secure version of BGP exists, called BGPSEC, but few U.S. carriers have adopted it, presumably because they do not expect a benefit from adoption that would offset its cost. What economic or other factors impede the adoption of border gateway protocols that would make it impossible, or substantially more difficult, to divert network traffic? How can those factors be reduced or eliminated? Fixing this systemic weakness would not appear to raise privacy concerns. 39 Machines, systems, and regions of the Internet, as well as persons, have identities.
  • 37. MIT Center for International Studies 37 MIT Internet Policy Research Initiative Challenge 4: Containing the “Blast Radius” of Destructive Attacks. It is now widely understood that malware cannot reliably be kept out of even very sophisticated and well-run systems. The challenge was therefore to contain its effects – or as one participant put it, to contain its “blast radius.” Participants returned several times to this topic and were deeply interested in technical means of accomplishing this objective (e.g., flexible segmentation and rapid reconstruction of networks). Challenge 5: Modernizing the Regulatory Environment Regulatory challenges fell into two groups: (i) creating flexible standards that would improve security as well as guide compliance (a goal that may be as elusive in theory as it has been in practice), and (ii) harmonizing regulations nationally and internationally. a. Flexible Standards Industry participants stated that regulatory norms are not adapting to rapidly changing technology and are rigid and costly without being effective. They noted several instances where firms were compliant with applicable standards but were penetrated anyway. They were interested in seeing flexible standards that would evolve with technology and reduce risk when implemented – like a standard of care. Participants referred to standards issued by the National Institute of Standards and Technology (NIST) and the International Standards Organisation.40 These could evolve into enforceable standards of care, but legally binding standards of care usually evolve through litigation; regulations are promulgated. A non-industry participant stated that compliance and risk-based standards are not necessarily in conflict, and that expecting government or a standards organization to compel virtue was not realistic. He added that mandating red- teaming forces threat-modeling. More broadly, he asked what success would look like under a risk-based approach and suggested this could be a fruitful research question. In this regard, participants would be interested to know whether sectoral stress tests could be developed. 40 NIST, “Framework for Improving Critical Infrastructure Cybersecurity,” v. 1.0, February 12, 2014, at https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework- 021214.pdf, accessed January 7, 2017; ISO/IEC 27032: 2012 Information Technology – Security Techniques – Guidelines for Cybersecurity, July 2012, at http://www.iso27001security.com/html/27032.html, accessed January 7, 2017.